SlideShare a Scribd company logo
1 of 16
Download to read offline
BIG DATA FUELS INTELLIGENCE-DRIVEN SECURITY
Rapid growth in security information creates new capabilities to defend
against the unknown
Authors
Sam Curry, Chief Technology Officer, Identity and Data Protection business unit; Chief Technologist, RSA, The Security Division of EMC
Engin Kirda, Sy and Laurie Sternberg Associate Professor of Information Assurance, Northeastern University
Eddie Schwartz, Vice President and CISO, RSA, The Security Division of EMC
William H. Stewart, Senior Vice President, Booz Allen Hamilton
Amit Yoran, General Manager, Security Management and Compliance business unit; Senior Vice President, RSA, The Security Division of EMC

January 2013


                                              KEY POINTS
  WHAT IS BIG DATA?                           •	The dissolution of traditional defensive perimeters coupled with attackers’ abilities to
                                                circumvent traditional security systems requires organizations to adopt an intelligence-
  Big data describes data                       driven security model that is more risk-aware, contextual, and agile.

  sets that are too large, too                •	Intelligence-driven security relies on big data analytics. Big data encompasses both the
                                                breadth of sources and the information depth needed for programs to assess risks
  unrefined or too fast-changing
                                                accurately and to defend against illicit activity and advanced cyber threats.
  for analysis using relational
                                              •	Within the next two years, we predict big data analytics will disrupt the status quo in
  or multidimensional database                  most information security product segments, including SIEM; network monitoring; user
                                                authentication and authorization; identity management; fraud detection; and
  techniques. Analyzing big
                                                governance, risk & compliance.
  data can require dozens,
                                              •	In the next three to five years, we predict data analytics tools will further evolve to
  hundreds or even thousands                    enable a range of advanced predictive capabilities and automated real-time controls.

  of servers running massively                •	Integrating big data analytics into business risk management and security operations
                                                will require organizations to rethink how information security programs are developed
  parallel software. What truly
                                                and executed. Six recommendations are presented in the section titled Building a Big
  distinguishes big data, aside                 Data Security Program.

  from its volume and variety,                •	Security teams need analysts who combine data science with a deep understanding of
                                                business risks and cyber-attack techniques. Personnel with these skill sets are scarce,
  is the potential to analyze it
                                                and they will remain in high demand. As a result, many organizations are likely turn to
  to uncover new insights to                    outside partners to supplement internal security analytics capabilities.

  optimize decision-making.




        RSA Security Brief
RSA Security Brief, January 2013




                                       Contents
                                       Big Data Holds Big Promise for Security............................................................................3
                                       More Data Means More Security.......................................................................................4
                                       Big Data Transforms Security Approaches.........................................................................6
                                             Security management...............................................................................................7
                                             Identity and access management (IAM)....................................................................7
                                             Fraud prevention......................................................................................................7
                                             Governance, risk and compliance (GRC)....................................................................7
                                       Building a Big Data Security Program...............................................................................8
                                       Looking Ahead: Big Data in Five Years?...........................................................................10
                                       About the Authors..........................................................................................................11
                                       Security Solutions & Programs.......................................................................................12
                                             From Booz Allen Hamilton......................................................................................12
                                             From Northeastern University.................................................................................13
                                             From RSA...............................................................................................................12



                                       RSA Security Briefs provide strategic insight and technical guidance on
                                       today’s high-stakes digital information risks and opportunities. This
                                       Brief is written by subject matter experts with deep technical knowledge
                                       and with broad exposure to how leading-edge organizations manage
                                       information security risks. Providing both big-picture context and practical
                                       technology advice, RSA Security Briefs are vital reading for today’s
                                       forward-thinking security executives.




RSA Security Brief
RSA Security Brief, January 2013




                                       BIG DATA HOLDS BIG PROMISE FOR SECURITY
                                       Big data is transforming the global business landscape. Organizations are analyzing huge
                                       volumes of diverse, fast-changing data to gain new insights that help them run their
                                       businesses better and get an advantage over the competition. In the same way that big
                                       data has transformed competitive dynamics in industries from retail to biotech, we
MOVING TO INTELLIGENCE-                expect it will also transform the information security sector. Big data’s new role in
                                       security comes at a time when organizations confront unprecedented information risk
DRIVEN SECURITY
                                       arising from two conditions:
Intelligence-driven security is a      1.	 Dissolving network boundaries – As organizations open and extend their data
modernized approach to security            networks – allowing partners, suppliers and customers to access corporate
                                           information in new, dynamic ways in order to push collaboration and innovation –
advocated by the Security for              they become more vulnerable to data misuse and theft. Corporate applications and
                                           data are also increasingly accessed through cloud services and mobile devices,
Business Innovation Council, a
                                           shattering what’s left of enterprise network boundaries and introducing new
group of top security executives           information risks and threat vectors.

from Global 1000 enterprises           2.	 More sophisticated adversaries – Cyber attackers have become more adept at waging
                                           highly targeted, complex attacks that evade traditional defenses, static threat
that publish recommendations
                                           detection measures and signature-based tools. Oftentimes, cyber attacks or fraud
to advance the practice of                 schemes perpetrated by advanced adversaries aren’t detected until well after damage
                                           has been done.
information security worldwide.
                                       The dissolution of traditional defensive perimeters coupled with attackers’ abilities to
In an intelligence-driven
                                       circumvent traditional security systems requires organizations to reinvent their security
security program, organizations        approach. In today’s hyper-extended, cloud-based, highly mobile business world,
                                       security approaches solely reliant on perimeter defenses—or that require predetermined
evaluate all the security-related
                                       knowledge of the threat or direct control over all infrastructure elements—are being made
information available to them,         obsolete. Instead, a more agile approach based on dynamic risk assessments, the
                                       analysis of vast volumes of data and real-time security operations will be essential to
both internally and externally,        providing meaningful security.
to maintain the visibility and         The Security for Business Innovation Council advises organizations to move to an
control needed to protect an           intelligence-driven security model, which relies on security-related information from
                                       internal and external sources to deliver a comprehensive picture of risk and security
organization’s most valued             vulnerabilities. (See sidebar titled Moving to Intelligence-driven Security.) As part of
information assets. For guidance       modernizing information security programs, organizations will have to reduce their
                                       reliance on signature-based scanning tools, which only detect limited-scope threats that
on implementing intelligence-          have been encountered in the past. Instead, organizations need to cultivate security
driven security programs, please       capabilities that will ultimately help them detect the unknown and predict threats in the
                                       future.
read the Council’s report “Getting
                                       To move in this direction, organizations must gain full visibility into the security
Ahead of Advanced Threats:             conditions of all IT assets handling valuable information. Today, however, most
                                       organizations effectively capture and analyze only a relatively small slice of security-
Achieving Intelligence-driven
                                       related information. Such information sources include network logs, SIEM system alerts
Information Security” available        and application access records. Many sources of security-related information have not
                                       been used in security operations because their data formats are too variable and
on RSA.com.
                                       unpredictable, the data sets are perceived to be too large and/or the data changes too
                                       quickly. Now, with recent advancements in computing power, storage systems, database
                                       management and analytics frameworks, no data set is too big or too fast. Information
                                       such as full packet capture, external threat intelligence feeds, website clickstreams,
                                       Microsoft® Outlook® calendars and social media activity can be used for security–related
                                       analysis.




RSA Security Brief                                                                                                          page 3
RSA Security Brief, January 2013




                                                Despite the challenges of normalizing vast amounts of information from such diverse and
                                                dynamic sources, big data will play an increasingly important role in security. By
Author Commentary
                                                incorporating big data into security programs, organizations gain richer context for
“Intelligence-driven security                   assessing risk and learning what’s “normal” for a particular user, group, business
                                                process or computing environment. As organizations develop fuller, more nuanced
reinforces the idea that no man
                                                profiles of both systems and users, security teams can enhance their ability to spot
is an island. When organizations                aberrant activity or behaviors, which often indicate deeper problems.
combine outside information                     Big data analytics is expected to emerge as the cornerstone of an intelligence-driven
with all of their own data that’s               security program for preventing, and even predicting, high-stakes security threats. In fact,
                                                the integration of big data into security tools represents a sea change in how information
available to them they start
                                                security programs may be designed and executed.
to see a more informed view
of threats. They correlate and                  MORE DATA MEANS MORE SECURITY
detect faint signals that they                  In an intelligence-driven security model, the definition of “security data” expands
couldn’t see before. Tremendous                 considerably. In this new model, security data encompasses any type of information that
                                                could contribute to a 360-degree view of the organization and its possible business risks.
value can be generated when all                 For an illustration of how diverse information with security applications can be, Figure 1
information within an enterprise                charts data sources that could be mined by identity and access management systems in
                                                the near future.
with security relevance gets
collected, organized, analyzed                  Because potential sources of security-related data are nearly endless, intelligence-driven
                                                security models require scalable, big data architectures to be in place to store and
and leveraged.”                                 manage all of the information that could prove helpful. Big data infrastructures will vary
  	          —Eddie Schwartz
                                                depending on each organization’s unique business requirements and relevant data
              RSA, The Security Division        sources. While optimizing big data platforms is important, the information will yield no
              of EMC                            insight if organizations cannot integrate data and apply the right analytical techniques
                                                and context. Different methods of analysis can be applied to make smarter, more


Figure 1: Big data enhances identity verification
SITUATION-AWARE IAM BUILDS RICH USER PROFILES
                PASSIVE INPUT                                                             ACTIVE INPUT
Geo IP location
Device security health
                                                                                              jdoe
                                  computer                                  username
  certificates
Wireless access points
Typing pattern recognition
Click stream patterns                                                       password
                                                                                              mycat
Wireless access points          mobile device
GPS location                                                                one-time
Network location                                                            password                 Hardware token
                                                                                                     Software token
                                                                                                     On-demand token

Access times                 physical access
                                                                        digital certificate
Access location



Organizational role              HR systems
                                                                       out-of-band phone
and privileges


                                travel system
Travel itineraries                                                      security questions           “Which of the following people
                                                                        knowledge-based       ????   do you meet with every
                                                                                                     Tuesday at 10:00 a.m.?”
                                                                           questions                 (multiple-choice list)
Internal application
                                    SIEM
  access
                                                                                                     fingerprint
Log data
                                                                                                     retina
Internal threats                                                           biometric                 iris
                                                                         authentication              facial recognition
                                  external
                                                                                                     typing recognition
IP blacklists                     sources
                                                                                                     voice recognition
External threats                                                                                     handwriting recognition


RSA Security Brief                                                                                                                    page 4
RSA Security Brief, January 2013




                                        targeted types of decisions. Once these analytics are finely tuned, they can inform
                                        controls on the network to take action: lock accounts down, quarantine systems, change
                                        network device settings, require a second form of authentication, or tip off a fraud-
                                        monitoring system, for example. This increased automation reduces the workload for
                                        security analysts while accelerating the identification and mitigation of security threats.

                                        When big data drives security, the result is a unified, self-evolving approach and a
                                        holistic awareness that discrete, stitched-together solutions can’t begin to achieve. A big
                                        data-driven security model has the following characteristics:

Author Commentary                       •	Diverse data sources – both internal and external – that multiply in value and create a
                                          synergistic learning effect as new security-related information is added
“Collecting big data is the easy
                                        •	Automated tools that collect diverse data types and normalize them so they’re usable
part. Understanding the data is           by analytics engines

the hard part. It’s best to start out   •	Analytics engines capable of processing vast volumes of fast-changing data in real time

working on a sub-problem: for           •	Advanced monitoring systems that continuously examine high-value systems and
                                          resources and make assessments based on behavior and risk models, not on static
example pinpoint the command
                                          threat signatures
and control center of a botnet,
                                        •	Active controls such as requiring additional user authentication, blocking data
and then take that information            transmissions or facilitating analysts’ decision-making when high-risk activity is
                                          detected
and correlate it against, say,
                                        •	Centralized warehouse where all security-related data is made available for security
connection information in your            analysts to query, either as a unified repository or, more likely, as a cross-indexed series
organization, to get better               of data stores

situational awareness.”                 •	Standardized views into indicators of compromise that are created in machine-readable
                                          form and can be shared at scale by trusted sources
 	       – Engin Kirda,
 	         Northeastern University      •	N-tier infrastructures that create scalability across vectors such as geography, storage
                                          and databases and have the ability to process large and complex searches and queries

                                        •	High degree of integration with security- and risk-management tools to facilitate
                                          detailed investigations of potential problems by analysts and to trigger automated
                                          defensive measures such as blocking network traffic, quarantining systems or requiring
                                          additional verification of user identity

                                        When big data drives security, the result is greatly enhanced visibility into IT
                                        environments and the ability to distinguish suspicious from normal activities to inspire
                                        trust in our IT systems.




RSA Security Brief                                                                                                              page 5
RSA Security Brief, January 2013




                                             BIG DATA TRANSFORMS SECURITY APPROACHES
                                             The quality and value of insight that can be derived from big data analytics is expected to
Author Commentary
                                             spur dramatic changes in almost every discipline within information security. The changes
“The game is changing. More and              have already begun, with an immediate need for advanced analytics arising in threat
                                             monitoring and incident investigations. These processes draw information from a variety
more data is going onto the Internet         of sources, analyzing both fresh and archived data to get a fuller, deeper view of security
                                             conditions (see Figure 2).
in automated forms, and that vector
                                             Leading-edge security operations centers (SOCs)—especially those in defense and
will continue. Therefore a security
                                             financial services organizations—are already discovering value from applying analytics to
analysis tool that worked great two          large sets of security data. They’re analyzing massive archives of security data to
                                             understand attackers’ techniques and to uncover subtle indicators that could help
or three years ago doesn’t work so
                                             identify hidden threats faster, track cyber adversaries and perhaps even predict future
well anymore. You now have to look           attacks. They’re applying fraud analysis techniques to reduce unauthorized access to user
                                             accounts and corporate resources.
through a whole lot more data, and
                                             While big data analytics tools for security were often custom-built in the past, this year
you have to look for threats that are
                                             leading security organizations will deploy commercial, off-the-shelf big data solutions in
far more subtle. Commercial tools            their SOCs. Within two years, we predict big data analytics will have disruptive impact on
                                             many categories in the information security sector, including SIEM; network monitoring;
are changing to take advantage               user authentication and authorization; identity management; fraud detection; and
of these big data streams coming             governance, risk and compliance systems. Longer term, big data is also expected to
                                             change the nature of conventional security controls such as anti-malware, data loss
online.”                                     prevention and firewalls—essentially the entire security spectrum.
 	       – William H. Stewart,
 	         Booz Allen Hamilton




Figure 2: Security investigations rely on big data




     Network/Host
                               Web Transactions           Infrastructure                Information                    Identity
        Traffic

Are there traffic           Has suspicious            Has the server been          What kind of data           Which users are
anomalies to/from           activity been             manipulated?                 does this system            logged in?
these servers?              observed in sensitive/                                 store, transmit,
•	Protocol                                            Is it vulnerable? Has                                    Have their privileges
                            high value                                             process?
  distribution?                                       its configuration                                        been escalated?
                            applications and
•	Encryption?                                         changed recently?            Is this regulated
                            assets?                                                                            Where did they log in?
•	Suspicious                                                                       information? High-
                            Potential sources:        Is it compliant with
  destinations?                                                                    value IP?                   What other assets did
                            •	Authentication data     policy?
                                                                                   Potential sources:          these users touch?
Potential sources:          •	Transaction
                                                      Potential sources:           •	DLP
•	SIEM                        monitoring                                                                       Potential sources:
                                                      •	IT assets                  •	Data classification
•	Network monitoring        •	Application logs                                                                 •	Authentication data
                                                      •	GRC systems                •	GRC systems
•	Application               •	SQL server logs                                                                  •	Microsoft Active
                                                      •	Configuration
  monitoriing               •	Network session data                                                               Directory®
                                                        management
                                                      •	Vulnerability                                          •	Server logs
                                                        management                                             •	Asset management
                                                                                                               •	SIEM
                                                                                                               •	Network monitoring


RSA Security Brief                                                                                                                page 6
RSA Security Brief, January 2013




                                        Security management
                                        SIEM and network monitoring capabilities have begun converging, creating a security
                                        analytics platform capable of massive and diverse real-time data collection and threat
                                        analysis. Security management driven by big-data analysis creates a unified view of
                                        multiple data sources and centralizes threat research capabilities, instead of forcing
                                        security analysts to deal with disparate tools that disrupt and potentially derail their
                                        workflows. The convergence of SIEM and network monitoring capabilities creates a
                                        unified security management system to assimilate all information that could possibly
                                        inform security. It ingests external threat intelligence and also offers the flexibility to
                                        integrate security data from existing technologies. Data processing happens on a much
                                        grander scale: today in the SIEM space, tools are capable of correlating thousands of
Author Commentary                       events per second; going forward, security management platforms will correlate hundreds
                                        of thousands, even millions, of events per second without the need to expand the
“In the coming year, top-tier           hardware footprint.
enterprises with progressive security
                                        Identity and access management (IAM)
capabilities are expected to adopt
                                        Next-generation tools enable risk-based, adaptive identity controls that continuously
intelligence-driven security models     evaluate and adjust the level of protection and access based on asset criticality and risk.
based on big data analytics. Over       By enabling situation-aware IAM, such tools provide continuous risk assessment of user
                                        activity, especially when accessing sensitive resources, even after initial authentication.
the next two or three years, we think   Profiles are based on historical behavior; a deep, complex user profile; a richer view of
that this security model will become    identities and a data-driven perspective of what normal behavior looks like.

much more widely adopted.”              Provisioning is done on demand, based on enforcement policies that are created on the
                                        fly. Today, access control is based on rigid policies that say this person is allowed to do
 	       —Eddie Schwartz                specific things. Next-generation access control systems acknowledge that an organization
          RSA, The Security Division    can’t foresee all possible scenarios and instead allows operators to describe the kind of
          of EMC
                                        behavior that’s desired, with the system working out the related rules.


                                        Fraud prevention
                                        Whether it’s financial fraud, transaction fraud or the fraudulent use of corporate
                                        resources, advanced security technologies analyze massive amounts of behavioral data
                                        and other diverse indicators to distinguish between malicious and legitimate business
                                        activities. We predict that session intelligence and behavioral and click-stream analysis
                                        will combine to stop business logic abuse in which attackers find a flaw in the functioning
                                        of an IT-based system and exploit it for illicit gain.


                                        Governance, risk and compliance (GRC)
                                        As organizations expand the scope of their GRC programs—bridging organizational siloes
                                        and business functions with a unified GRC system—the amount of data that such systems
                                        can handle will need to grow exponentially. We predict that GRC platforms will evolve to
                                        provide real-time access to the entirety of information relevant to understanding business
                                        risks and to prioritizing security activities. They’ll analyze larger volumes of data to
                                        facilitate better, smarter decisions about the level, sources and criticalities of risk facing
                                        an organization. They’ll also inform SOCs about valuable assets that are at high levels of
                                        risk and help prioritize steps that an organization should take to mitigate those risks.




RSA Security Brief                                                                                                              page 7
RSA Security Brief, January 2013




                                              In addition to transforming existing categories of security tools, we also believe that big
                                              data will inspire the development of new tools that have yet to be conceived. Tools driven
                                              by big data security analytics will inform where and when to apply controls—or how to
                                              change them—to better protect information, identities and infrastructure.


                                              BUILDING A BIG DATA SECURITY PROGRAM
                                              Integrating big data analytics into security operations—the cornerstone of an intelligence-
                                              driven security model—will require organizations to rethink how security programs are
Author Commentary                             developed and executed. In updating security programs to take advantage of big data,
                                              organizations should consider the following steps:
“Until very recently in security
                                              1.	 Set a holistic cyber security strategy – Organizations should align their security
we’ve had to do all sorts of
                                                  capabilities behind a holistic cyber security strategy and program that’s customized
complicated things to filter,                     for the organization’s specific risks, threats and requirements. The security strategy
preprocess and ultimately reduce                  should integrate big data analytics as part of a broader array of technical solutions,
                                                  combined with tailored processes and expert staff. In most cases, a detailed
our visibility to get down to a
                                                  assessment of an organization’s current security posture, including an industry peer
manageable data set, perform                      comparison, lays the groundwork for an effective cyber security program.
analytics and make decisions.                 2.	 Establish a shared data architecture for security information – Because big data
But with extremely high-speed,                    analytics require information to be collected from various sources in many different
                                                  formats, a single architecture that allows all information to be captured, indexed,
scalable big data platforms, we
                                                  normalized, analyzed and shared is a logical goal.
have a much richer set of visibility
                                              3.	 Migrate from point products to a unified security architecture – Developing a unified
tools to begin the whole security                 security analytics framework will require a big-picture, more disciplined approach to
process. Once you have the data                   security investments than most organizations have shown in the past. Organizations
                                                  need to think strategically about which security products they will continue to support
in the platform, you can then go
                                                  and use over several years, because each product will introduce its own data structure
through a number of different                     that must be integrated into a unified analytics framework for security—or deliberately
analytical methods and techniques,                omitted as a potential blind spot. In many cases, the TCO benefits of unifying the data
                                                  architecture for security analytics may outweigh the benefits of preserving existing
based on what you’re trying to                    point products. Conversely, if a particular product isn’t compatible with a given
accomplish.”                                      security data architecture, it’s unlikely to deliver long-term value.

	        – Amit Yoran                         4.	 Look for open and scalable big data security tools – Organizations should ensure that
          RSA, The Security Division of EMC       ongoing investments in security products favor technologies using agile analytics-
                                                  based approaches, not static tools based on threat signatures or network boundaries.
                                                  New, big data-ready tools should offer the architectural flexibility to change as the
                                                  business, IT or threat landscape evolves.




RSA Security Brief                                                                                                                   page 8
RSA Security Brief, January 2013




                                       5.	 Strengthen the SOC’s data science skills – While emerging security solutions will be
                                           big data ready, security teams may not be. Data analytics is an area where on-staff
                                           talent is lacking: a recent survey conducted by IDC-Computerworld of analytics
                                           professionals found that 70 percent identified “lack of a sufficient number of staff with
                                           analytics skills” as a key challenge to delivering a successful business intelligence and
                                           analytics solution in their organizations.1 Security leaders should consider adding data
                                           scientists to their teams. Such specialists will not only need to manage the
                                           organization’s big data capabilities efficiently, but they will also need to understand
Author Commentary                          business risks and cyber-attack techniques in sufficient depth to develop analytical
                                           models that detect, and even predict, illicit activities. Data scientists with specialized
“Defending against sophisticated           knowledge in security are scarce, and they will remain in high demand. As a result,
                                           many organizations are likely turn to outside partners to supplement internal security
adversaries requires advanced
                                           analytics capabilities.
analytics to help narrow the field
                                       6.	 Leverage external threat intelligence – Augment internal security analytics programs
and focus around advanced                  with external threat intelligence services. Often threat indicators, attack forensics or
threats. This technology is                intelligence feeds from outside sources are not machine-readable and require
                                           extensive manual processing by SOC analysts. SOCs should evaluate service providers
necessary to help analysts solve
                                           aggregating threat data from many trustworthy, relevant sources. Data from these
the hardest security problems.             sources should be in formats that can be automatically ingested by security analytics
You’re reacting to a mind and a            platforms for correlation with internal data.

person, and therefore you need
creative and empowered people
to defend yourself. Analytics tools
inform analysts, provide scale and
identify patterns of behavior too
subtle to be otherwise observed.”
	        – William H. Stewart
	          Booz Allen Hamilton




RSA Security Brief                     IDC Link: Analytics Education – Does One Size Fit All?, Doc #lcUS23882612, December 2012
                                       1
                                                                                                                                  page 9
RSA Security Brief, January 2013




                                        LOOKING AHEAD: BIG DATA IN FIVE YEARS?
Author Commentary                       If many information security products are enhanced with big data analytics within the
                                        next couple of years, what will happen down the road when such products take root and
“Traditional security controls are
                                        are broadly deployed? In the next three to five years, we predict data analytics tools will
like a machine that you put a           advance rapidly and enable the following security capabilities:

recipe into and they always make        •	 Security analysts will be able to use tools with intuitive interfaces to spot
                                           relationships among data sets and create correlations that build upon themselves,
exactly the thing that you ask for.        painting the most complete security picture possible.
The new security world is like          •	 SOCs will gain the requisite expertise, processes and tools to make the most of the
looking in your fridge and having          security data available to them. They consistently collect data from the right internal
                                           and external sources and use analytics to detect many, if not most, attacks and
it tell you, based on what’s               prevent unwanted outcomes. Some SOCs will develop advanced data models that are
available, what would taste good           accurate enough to predict certain types of cyber attacks.

and then it makes it for you. For       •	 Data analytics systems will empower users with decision-support capabilities at
                                           crucial times—usually before damage can be done. Analytics systems will inform real-
example, think about adaptive              time decision making, triggering automated tools such as risk-aware user
access control, cutting off the            authentication systems or notifying SOC analysts so they can take action based on
                                           detailed reports of what’s happening in the moment.
bad guys before they have even
                                        •	 Security management tools will automatically share relevant threat data with trusted
gotten into the network because            partners and creatively reuse big data in different security scenarios.
you can tell where they’re going        Big data analytics, when used within an intelligence-driven security program, automates
to be. That’s cool stuff.”              many risk assessments and threat detection processes and puts the advantage of time
                                        back in an organization’s hands. Big data analytics also help enhance situational
	        – Sam Curry                    awareness and shorten reaction times to potential risks and problems. We believe it will
           RSA, The Security Division   prove instrumental in helping the global security community bring about a more trusted
           of EMC
                                        digital world.




RSA Security Brief                                                                                                            page 10
RSA Security Brief, January 2013




                                               About the Authors

                                Sam Curry      Sam Curry has more than 20 years of experience in security product management and
        Chief Technology Officer, Identity     development, marketing, engineering, quality assurance, customer support and sales. His
       and Data Protection business unit       experience also includes cryptography and research, and he is a regular contributor to a
                      Chief Technologist       number or journals and periodicals. Prior to his current role, Mr. Curry was CTO, Market-
        RSA, The Security Division of EMC      ing and Vice President of Product Management at RSA, charged with leading the strategic
                                               direction for all RSA solutions. Before joining RSA, Mr. Curry was Vice President of Product
                                               Management and Marketing for a broad information security management portfolio at
                                               CA. Previously, Mr. Curry served as Chief Security Architect and led Product Marketing
                                               and Product Management at McAfee. He holds degrees in English and Physics from the
                                               University of Massachusetts and from Mount Allison University and has founded success-
                                               ful security startups.

                             Engin Kirda       Engin Kirda is the Sy and Laurie Sternberg Associate Professor of Information Assurance at
   The Sy and Laurie Sternberg Associate       Northeastern University and also holds the position of director of the Northeastern Infor-
    Professor of Information Assurance         mation Assurance Institute. Previously, Dr. Kirda held faculty positions at Institute Eurécom
                 Northeastern University       on the French Riviera and the Technical University of Vienna, where he co-founded the
                                               Secure Systems Lab that is now distributed across five institutions in the U.S. and Europe.
                                               Dr. Kirda is interested in systems, software and network security with specific focus on
                                               web security, binary analysis and malware detection. He is a co-founder and Director of Re-
                                               search at Lastline, a company specializing in advanced threat detection based on cutting-
                                               edge research conducted at Northeastern University.

                          Eddie Schwartz       Eddie Schwartz is Chief Information Security Officer for RSA and has 25 years of experience
     Vice President and Chief Information      in the information security field. Previously, he was Co-Founder and Chief Security Officer
                         Security Officer      of NetWitness (acquired by EMC), CTO of ManTech, EVP and General Manager of Global In-
        RSA, The Security Division of EMC      tegrity (acquired by INS), SVP of Operations of Guardent (acquired by VeriSign), CISO of Na-
                                               tionwide Insurance, a Senior Computer Scientist at CSC, and a Foreign Service Officer with
                                               the U.S. Department of State. Mr. Schwartz has advised a number of early stage security
                                               companies, and served on the Executive Committee for the Banking Information Technol-
                                               ogy Secretariat (BITS). Mr. Schwartz has a B.I.S. in Information Security Management and
                                               an M.S. in Information Technology Management from the George Mason University School
                                               of Management.

                          William H. Stewart   William Stewart is a Booz Allen Hamilton senior vice president with more than 25 years
                       Senior Vice President   of professional experience designing, developing and deploying cyber solutions. In his
                        Booz Allen Hamilton    current role, he leads the Cyber Technology Center of Excellence (COE), which includes
                                               more than 3,000 staff and provides consulting and systems integration expertise to public
                                               and private sector clients. Mr. Stewart and his team offer strategy and implementation for
                                               today’s most complex security problems. Prior to joining Booz Allen Hamilton, Mr. Stewart
                                               worked for a major electronics firm and also served as a signal officer in the U.S. Army. Mr.
                                               Stewart holds a MS in Electrical Engineering from Drexel University and a BS in Engineering
                                               from Widener University.

                               Amit Yoran      Amit Yoran oversees RSA’s Security Management and Compliance business unit. He is a
                    Senior Vice President      Commissioner of the CSIS Commission on Cyber Security advising the 44th Presidency and
General Manager, Security Management &         serves on several industry and national advisory bodies. Mr. Yoran came to RSA through
                Compliance business unit       EMC’s acquisition of NetWitness in 2011. Prior to NetWitness, Mr. Yoran served as Director
        RSA, The Security Division of EMC      of the National Cyber Security Division at the Department of Homeland Security. Formerly,
                                               he served as the Vice President of Worldwide Managed Security Services at the Symantec
                                               Corporation. Mr. Yoran was the co-founder of Riptech, a market-leading IT security com-
                                               pany, and served as its CEO until the company was acquired by Symantec in 2002. He
                                               also served as an officer in the U.S. Air Force in the Department of Defense’s Computer
                                               Emergency Response Team. Mr. Yoran received a Master of Science degree from the George
                                               Washington University, a Bachelor of Science from the United States Military Academy at
                                               West Point, and an honorary Doctorate from the University of Advancing Technology.

  RSA Security Brief
                                                                                                                                     page 11
RSA Security Brief, January 2013




                                       SECURITY SOLUTIONS & PROGRAMS
                                       The offerings described below align with the recommendations presented in this RSA
                                       Security Brief. The following overview of products and programs is not intended to
                                       provide a comprehensive list of applicable solutions. Rather, it’s intended to serve
                                       as a starting point for security technology practitioners and compliance officers
                                       wanting to learn about some of the options available to them.

                                       From Booz Allen Hamilton
                                       Booz Allen Hamilton (Booz Allen) helps clients evolve cyber security programs to
                                       reduce risk to their business operations and critical digital assets posed by
                                       increasingly severe cyber threats. Booz Allen’s approach is informed by a deep
                                       understanding of sophisticated adversary behavior, anchored by the current state of
                                       the art in cyber security technology and practice, and balanced with a strong focus
                                       on clients’ business needs. Booz Allen’s Intelligence Driven Dynamic Defense
                                       Framework helps clients shift from largely static, perimeter-based cyber defenses to
                                       active, operationally focused capabilities that employ big data analytics capable of
                                       anticipating and reacting to evolving threats.

                                       Booz Allen’s Intelligence Driven Dynamic Defense Framework includes the following
                                       offerings:

                                       Threat Intelligence: Booz Allen’s Cyber4Sight™ managed service delivers predictive
                                       cyber threat intelligence 24 hours a day, 7 days a week. Cyber4Sight delivers near-
                                       real-time cyber threat intelligence to protect clients’ entire business operations
                                       across the global Internet. The service correlates anomalies observed within our
                                       clients’ networks with the techniques, motivations, objectives and intentions seen in
                                       human cyber threat actors across the globe.

                                       Incident Response: Booz Allen provides full-suite triage capabilities, with experts in
                                       critical response delivering effective solutions for DDoS, insider threats, advanced
                                       persistent threat compromises and other security breaches. Incident response
                                       services are often enhanced with Automated First Responder (AFR), a non-signature-
                                       based approach to uncovering an adversary’s presence, threat origins, and the
                                       methods for controlling and remediating attackers’ activities while preventing further
                                       intrusions.

                                       Preemptive Response: Booz Allen leverages its long heritage as a management and
                                       technology consulting firm to help clients gain a greater understanding of the
                                       business challenges and opportunities related to cyber security programs. Our
                                       preemptive response services are built around our Cyber M3: Measure, Manage, and
                                       Mature model. Booz Allen offers a range of Cyber M3 diagnostic and strategy
                                       services to help clients advance their security capabilities. At the premier level,
                                       services help clients: 1) create holistic cyber security programs aligned with
                                       business needs, 2) develop a balanced portfolio of complementary capabilities, and
                                       3) prioritize how to satisfy the diverse needs of stakeholders through justifiable
                                       resource expenditures.




RSA Security Brief                                                                                                       page 12
RSA Security Brief, January 2013




                                       Integrated Remediation: Booz Allen uses a multi-disciplinary approach
                                       encompassing policy, operations, technologies, management and people to
                                       synchronize remediation efforts. This ensures that cyber protection is fully integrated
                                       and effectively achieved. Booz Allen services range from “design” partnerships, in
                                       which Booz Allen experts work hand-in-hand with clients to develop comprehensive
                                       capabilities (e.g., End-to-End Hunt Team Operational Operating Models), to
                                       “implementation” engagements, in which Booz Allen provides world-class services
                                       in execution and delivery of cyber services (e.g., PKI solution integrations, network
                                       segmentations, etc.).


                                       From Northeastern University
                                       Northeastern University offers Master of Science and Ph.D. programs in Information
                                       Assurance (IA). The specialized field of IA protects information systems by ensuring
                                       data privacy and integrity, user authenticity and legitimate use of system resources.
                                       IA professionals understand the relationships between information technology and
                                       people, systems, society, policy and law. Northeastern University’s interdisciplinary
                                       IA programs are offered jointly by the College of Computer and Information Science,
                                       the College of Engineering and the College of Social Sciences and Humanities and
                                       are the only such programs in New England. Program graduates typically work in
                                       government agencies, as well as in commercial and financial organizations. The
                                       National Security Agency/Department of Homeland Security has designated
                                       Northeastern University as a Center of Academic Excellence in Information Assurance
                                       Research and Education.


                                       From RSA
                                       RSA® Adaptive Authentication, with its advanced self-learning risk engine, calculates
                                       a risk score based on the user behavior profile, the device profile and the
                                       eFraudNetwork™ match. This risk score is provided to a policy engine and the user is
                                       either granted access, required to provide an alternate authentication credential or
                                       denied access. RSA Adaptive Authentication is a proven solution protecting
                                       thousands of organizations and users worldwide today.

                                       The RSA Advanced Cyber Defense Practice provides a complete range of innovative
                                       consulting and professional services to organizations needing to mitigate cyber
                                       threats while pursuing their business objectives. Using RSA’s proven Total Threat
                                       Visibility & Mitigation methodology, practice consultants help organizations
                                       strengthen their operational security programs by optimizing how their people,
                                       processes and technology solutions work together. Consulting services include
                                       conducting breach readiness assessments to minimize exposure to attacks;
                                       fortifying approaches to identity/access management; unifying governance, risk and
                                       compliance practices; and redesigning SOCs/CIRCs. The RSA Advanced Cyber
                                       Defense Practice also provides expert counsel and hands-on assistance with all
                                       aspects of advanced threat detection, response and remediation.




RSA Security Brief                                                                                                        page 13
RSA Security Brief, January 2013




                                       RSA® Archer™ GRC Suite is the market-leading solution for managing enterprise
                                       governance, risk and compliance (GRC). It provides a flexible, collaborative platform
                                       to manage enterprise risks, automate business processes, demonstrate compliance
                                       and gain visibility into exposures and gaps across the organization. The RSA Archer
                                       GRC platform is designed to draw data from a wide variety of systems to serve as a
                                       central repository for risk-, compliance- and security-related information. The RSA
                                       Archer Threat Management solution is an early-warning system for tracking threats.
                                       The RSA Archer Incident Management solution helps organizations escalate
                                       problems, track the progress of investigations and coordinate problem resolution.
                                       The platform’s ability to integrate information on security alerts and threats, to
                                       gather and present metrics about the effectiveness of security controls and
                                       processes and to analyze contextual information about the security and business
                                       environment helps create actionable, real-time intelligence across the enterprise.

                                       RSA® Cloud Trust Authority (CTA) is a collection of cloud-based services to simplify
                                       and enhance identity, information and cloud infrastructure security, as well as
                                       compliance reporting. With RSA Cloud Trust Authority, public cloud service providers
                                       and their customers do not need to establish individual point-to-point integrations to
                                       establish trust; instead, participants can establish many cloud security relationships
                                       simultaneously through a single integration with the CTA service. Enterprises can
                                       manage secure user access and user provisioning to multiple public cloud service
                                       providers via federated single sign-on and directory synchronization with options for
                                       strong authentication.

                                       The RSA Live platform operationalizes threat intelligence by consolidating
                                       information from the global security community and fusing these external data sets
                                       with an organization’s internal data. The platform gathers security information from
                                       the industry’s most trusted and reliable sources, including proprietary RSA
                                       FirstWatch research. RSA’s expert security analysts consolidate and evaluate threat
                                       data from diverse sources to illuminate the information most relevant to your
                                       organization. The data is then distributed and operationalized via correlation rules,
                                       blacklists, parsers, views and feeds. This automated approach allows organizations
                                       to take advantage of the intelligence that others have already found and to discern
                                       what they should look for in applying threat intelligence to current and historical
                                       data.




RSA Security Brief                                                                                                        page 14
RSA Security Brief, January 2013




                                       RSA® Security Analytics is designed to provide organizations with the situational
                                       awareness needed to deal with their most pressing security issues. By offering
                                       enterprise-wide visibility into network traffic and log event data, the RSA Security
                                       Analytics system can help organizations gain a comprehensive view of their IT
                                       environment, enabling security analysts to prioritize threats quickly, investigate
                                       them, make remediation decisions and take action. The RSA Security Analytics
                                       solution’s distributed data architecture is engineered to collect and analyze massive
                                       volumes of information – hundreds of terabytes and beyond – at very high speed
                                       using multiple modes of analysis. The solution is also capable of integrating external
                                       threat intelligence about the latest tools, techniques and procedures in use by the
                                       attacker community and of helping organizations track and manage responses to
                                       security issues identified through the solution. The RSA Security Analytics platform is
                                       planned for commercial release in early 2013.

                                       RSA® Silver Tail software and SaaS solutions protect organizations from cyber attack,
                                       cybercrime, and fraud by analyzing web sessions and mobile traffic to distinguish
                                       suspicious or malicious activities from legitimate ones. The Silver Tail platform
                                       collects and analyzes massive amounts of real-time data from web and mobile traffic
                                       to power the platform’s behavioral analysis engine. The behavioral analysis engine
                                       creates heuristics and rules to learn the typical conditions and behaviors within any
                                       IT-based system and to detect anomalies that signal IT security threats, fraud, insider
                                       threats, business logic abuse and other malicious activity. 




RSA Security Brief                                                                                                        page 15
RSA Security Brief, January 2013




                                     ABOUT RSA
                                     RSA, The Security Division of EMC, is the premier provider of security, risk and
                                     compliance management solutions for business acceleration. RSA helps the world’s
                                     leading organizations solve their most complex and sensitive security challenges.
                                     These challenges include managing organizational risk, safeguarding mobile access
                                     and collaboration, proving compliance, and securing virtual and cloud environments.

                                     Combining business-critical controls in identity assurance, encryption & key
                                     management, SIEM, data loss prevention, continuous network monitoring, and fraud
                                     protection with industry leading GRC capabilities and robust consulting services, RSA
                                     brings visibility and trust to millions of user identities, the transactions that they
                                     perform and the data that is generated. For more information, please visit www.RSA.
                                     com and www.EMC.com.




                                   ©2013 EMC Corporation. All rights reserved. EMC2, EMC, the EMC logo, Archer, eFraudNetwork, RSA and the RSA logo
                                   are registered trademarks or trademarks of EMC Corporation in the United States and other countries. Booz Allen
                                   Hamilton, Booz Allen and Cyber4Sight are the registered and/or unregistered service marks or trademarks of Booz
                                   Allen or its licensors. Active Directory, Microsoft and Outlook are registered trademarks of Microsoft. All other
                                   products or services mentioned are trademarks of their respective companies.

      www.rsa.com                  168628 H11437 BD BRF 0113

More Related Content

What's hot

Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013drewz lin
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive SecurityComputerworld Philippines
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016Ulf Mattsson
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016Ulf Mattsson
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...Scalar Decisions
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Martin Ruubel
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for EndpointMighty Guides, Inc.
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperMartin Ruubel
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...Ulf Mattsson
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax Technology
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Ulf Mattsson
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 

What's hot (20)

Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 

Viewers also liked

Make your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient MetaphorsMake your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient MetaphorsHelena T Cullina
 
Cardiac procedures
Cardiac proceduresCardiac procedures
Cardiac proceduresstaceyhunt
 
福音的開始、中斷與振興 景高
福音的開始、中斷與振興 景高福音的開始、中斷與振興 景高
福音的開始、中斷與振興 景高zenixls2
 
GARUDA Youth Community Newsletter Agustus 2011
GARUDA Youth Community Newsletter Agustus 2011GARUDA Youth Community Newsletter Agustus 2011
GARUDA Youth Community Newsletter Agustus 2011Garuda Youth Community
 
Com 606 presentation
Com 606 presentationCom 606 presentation
Com 606 presentationabfinner
 
Federmanager bo convegno impermanenza_27_03_13
Federmanager bo  convegno impermanenza_27_03_13Federmanager bo  convegno impermanenza_27_03_13
Federmanager bo convegno impermanenza_27_03_13Marco Frullanti
 
Stalking the Kill Chain
Stalking the Kill ChainStalking the Kill Chain
Stalking the Kill ChainEMC
 
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage SystemsTechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage SystemsEMC
 
MDP on Financial Statement Analysis
MDP on  Financial Statement AnalysisMDP on  Financial Statement Analysis
MDP on Financial Statement Analysiskanagaraj300
 
Male pop aritst representation
Male pop aritst representationMale pop aritst representation
Male pop aritst representationloousmith
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...EMC
 
Johnny chiquito
Johnny chiquitoJohnny chiquito
Johnny chiquitoMirymullo
 
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...EMC
 
First lesson
First lessonFirst lesson
First lessonmeteab
 

Viewers also liked (20)

Make your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient MetaphorsMake your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient Metaphors
 
Documento del blog
Documento del blogDocumento del blog
Documento del blog
 
Cardiac procedures
Cardiac proceduresCardiac procedures
Cardiac procedures
 
福音的開始、中斷與振興 景高
福音的開始、中斷與振興 景高福音的開始、中斷與振興 景高
福音的開始、中斷與振興 景高
 
GARUDA Youth Community Newsletter Agustus 2011
GARUDA Youth Community Newsletter Agustus 2011GARUDA Youth Community Newsletter Agustus 2011
GARUDA Youth Community Newsletter Agustus 2011
 
Com 606 presentation
Com 606 presentationCom 606 presentation
Com 606 presentation
 
Hotel1
Hotel1Hotel1
Hotel1
 
About Us
About UsAbout Us
About Us
 
Amy kearney martin luther king
Amy kearney martin luther kingAmy kearney martin luther king
Amy kearney martin luther king
 
Gid pics
Gid picsGid pics
Gid pics
 
Federmanager bo convegno impermanenza_27_03_13
Federmanager bo  convegno impermanenza_27_03_13Federmanager bo  convegno impermanenza_27_03_13
Federmanager bo convegno impermanenza_27_03_13
 
Stalking the Kill Chain
Stalking the Kill ChainStalking the Kill Chain
Stalking the Kill Chain
 
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage SystemsTechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
 
MDP on Financial Statement Analysis
MDP on  Financial Statement AnalysisMDP on  Financial Statement Analysis
MDP on Financial Statement Analysis
 
Male pop aritst representation
Male pop aritst representationMale pop aritst representation
Male pop aritst representation
 
Teacher & guru
Teacher & guruTeacher & guru
Teacher & guru
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
 
Johnny chiquito
Johnny chiquitoJohnny chiquito
Johnny chiquito
 
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
White Paper: Next-Generation Genome Sequencing Using EMC Isilon Scale-Out NAS...
 
First lesson
First lessonFirst lesson
First lesson
 

Similar to Industry Overview: Big Data Fuels Intelligence-Driven Security

Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics EMC
 
Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” EMC
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
software_defined_security_market.pdf
software_defined_security_market.pdfsoftware_defined_security_market.pdf
software_defined_security_market.pdftechtomorrow570
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for SuccessCitrix
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issueSonaliG6
 

Similar to Industry Overview: Big Data Fuels Intelligence-Driven Security (20)

Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
 
Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data” Getting Real About Security Management and “Big Data”
Getting Real About Security Management and “Big Data”
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
software_defined_security_market.pdf
software_defined_security_market.pdfsoftware_defined_security_market.pdf
software_defined_security_market.pdf
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Recently uploaded (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Industry Overview: Big Data Fuels Intelligence-Driven Security

  • 1. BIG DATA FUELS INTELLIGENCE-DRIVEN SECURITY Rapid growth in security information creates new capabilities to defend against the unknown Authors Sam Curry, Chief Technology Officer, Identity and Data Protection business unit; Chief Technologist, RSA, The Security Division of EMC Engin Kirda, Sy and Laurie Sternberg Associate Professor of Information Assurance, Northeastern University Eddie Schwartz, Vice President and CISO, RSA, The Security Division of EMC William H. Stewart, Senior Vice President, Booz Allen Hamilton Amit Yoran, General Manager, Security Management and Compliance business unit; Senior Vice President, RSA, The Security Division of EMC January 2013 KEY POINTS WHAT IS BIG DATA? • The dissolution of traditional defensive perimeters coupled with attackers’ abilities to circumvent traditional security systems requires organizations to adopt an intelligence- Big data describes data driven security model that is more risk-aware, contextual, and agile. sets that are too large, too • Intelligence-driven security relies on big data analytics. Big data encompasses both the breadth of sources and the information depth needed for programs to assess risks unrefined or too fast-changing accurately and to defend against illicit activity and advanced cyber threats. for analysis using relational • Within the next two years, we predict big data analytics will disrupt the status quo in or multidimensional database most information security product segments, including SIEM; network monitoring; user authentication and authorization; identity management; fraud detection; and techniques. Analyzing big governance, risk & compliance. data can require dozens, • In the next three to five years, we predict data analytics tools will further evolve to hundreds or even thousands enable a range of advanced predictive capabilities and automated real-time controls. of servers running massively • Integrating big data analytics into business risk management and security operations will require organizations to rethink how information security programs are developed parallel software. What truly and executed. Six recommendations are presented in the section titled Building a Big distinguishes big data, aside Data Security Program. from its volume and variety, • Security teams need analysts who combine data science with a deep understanding of business risks and cyber-attack techniques. Personnel with these skill sets are scarce, is the potential to analyze it and they will remain in high demand. As a result, many organizations are likely turn to to uncover new insights to outside partners to supplement internal security analytics capabilities. optimize decision-making. RSA Security Brief
  • 2. RSA Security Brief, January 2013 Contents Big Data Holds Big Promise for Security............................................................................3 More Data Means More Security.......................................................................................4 Big Data Transforms Security Approaches.........................................................................6 Security management...............................................................................................7 Identity and access management (IAM)....................................................................7 Fraud prevention......................................................................................................7 Governance, risk and compliance (GRC)....................................................................7 Building a Big Data Security Program...............................................................................8 Looking Ahead: Big Data in Five Years?...........................................................................10 About the Authors..........................................................................................................11 Security Solutions & Programs.......................................................................................12 From Booz Allen Hamilton......................................................................................12 From Northeastern University.................................................................................13 From RSA...............................................................................................................12 RSA Security Briefs provide strategic insight and technical guidance on today’s high-stakes digital information risks and opportunities. This Brief is written by subject matter experts with deep technical knowledge and with broad exposure to how leading-edge organizations manage information security risks. Providing both big-picture context and practical technology advice, RSA Security Briefs are vital reading for today’s forward-thinking security executives. RSA Security Brief
  • 3. RSA Security Brief, January 2013 BIG DATA HOLDS BIG PROMISE FOR SECURITY Big data is transforming the global business landscape. Organizations are analyzing huge volumes of diverse, fast-changing data to gain new insights that help them run their businesses better and get an advantage over the competition. In the same way that big data has transformed competitive dynamics in industries from retail to biotech, we MOVING TO INTELLIGENCE- expect it will also transform the information security sector. Big data’s new role in security comes at a time when organizations confront unprecedented information risk DRIVEN SECURITY arising from two conditions: Intelligence-driven security is a 1. Dissolving network boundaries – As organizations open and extend their data modernized approach to security networks – allowing partners, suppliers and customers to access corporate information in new, dynamic ways in order to push collaboration and innovation – advocated by the Security for they become more vulnerable to data misuse and theft. Corporate applications and data are also increasingly accessed through cloud services and mobile devices, Business Innovation Council, a shattering what’s left of enterprise network boundaries and introducing new group of top security executives information risks and threat vectors. from Global 1000 enterprises 2. More sophisticated adversaries – Cyber attackers have become more adept at waging highly targeted, complex attacks that evade traditional defenses, static threat that publish recommendations detection measures and signature-based tools. Oftentimes, cyber attacks or fraud to advance the practice of schemes perpetrated by advanced adversaries aren’t detected until well after damage has been done. information security worldwide. The dissolution of traditional defensive perimeters coupled with attackers’ abilities to In an intelligence-driven circumvent traditional security systems requires organizations to reinvent their security security program, organizations approach. In today’s hyper-extended, cloud-based, highly mobile business world, security approaches solely reliant on perimeter defenses—or that require predetermined evaluate all the security-related knowledge of the threat or direct control over all infrastructure elements—are being made information available to them, obsolete. Instead, a more agile approach based on dynamic risk assessments, the analysis of vast volumes of data and real-time security operations will be essential to both internally and externally, providing meaningful security. to maintain the visibility and The Security for Business Innovation Council advises organizations to move to an control needed to protect an intelligence-driven security model, which relies on security-related information from internal and external sources to deliver a comprehensive picture of risk and security organization’s most valued vulnerabilities. (See sidebar titled Moving to Intelligence-driven Security.) As part of information assets. For guidance modernizing information security programs, organizations will have to reduce their reliance on signature-based scanning tools, which only detect limited-scope threats that on implementing intelligence- have been encountered in the past. Instead, organizations need to cultivate security driven security programs, please capabilities that will ultimately help them detect the unknown and predict threats in the future. read the Council’s report “Getting To move in this direction, organizations must gain full visibility into the security Ahead of Advanced Threats: conditions of all IT assets handling valuable information. Today, however, most organizations effectively capture and analyze only a relatively small slice of security- Achieving Intelligence-driven related information. Such information sources include network logs, SIEM system alerts Information Security” available and application access records. Many sources of security-related information have not been used in security operations because their data formats are too variable and on RSA.com. unpredictable, the data sets are perceived to be too large and/or the data changes too quickly. Now, with recent advancements in computing power, storage systems, database management and analytics frameworks, no data set is too big or too fast. Information such as full packet capture, external threat intelligence feeds, website clickstreams, Microsoft® Outlook® calendars and social media activity can be used for security–related analysis. RSA Security Brief page 3
  • 4. RSA Security Brief, January 2013 Despite the challenges of normalizing vast amounts of information from such diverse and dynamic sources, big data will play an increasingly important role in security. By Author Commentary incorporating big data into security programs, organizations gain richer context for “Intelligence-driven security assessing risk and learning what’s “normal” for a particular user, group, business process or computing environment. As organizations develop fuller, more nuanced reinforces the idea that no man profiles of both systems and users, security teams can enhance their ability to spot is an island. When organizations aberrant activity or behaviors, which often indicate deeper problems. combine outside information Big data analytics is expected to emerge as the cornerstone of an intelligence-driven with all of their own data that’s security program for preventing, and even predicting, high-stakes security threats. In fact, the integration of big data into security tools represents a sea change in how information available to them they start security programs may be designed and executed. to see a more informed view of threats. They correlate and MORE DATA MEANS MORE SECURITY detect faint signals that they In an intelligence-driven security model, the definition of “security data” expands couldn’t see before. Tremendous considerably. In this new model, security data encompasses any type of information that could contribute to a 360-degree view of the organization and its possible business risks. value can be generated when all For an illustration of how diverse information with security applications can be, Figure 1 information within an enterprise charts data sources that could be mined by identity and access management systems in the near future. with security relevance gets collected, organized, analyzed Because potential sources of security-related data are nearly endless, intelligence-driven security models require scalable, big data architectures to be in place to store and and leveraged.” manage all of the information that could prove helpful. Big data infrastructures will vary —Eddie Schwartz depending on each organization’s unique business requirements and relevant data RSA, The Security Division sources. While optimizing big data platforms is important, the information will yield no of EMC insight if organizations cannot integrate data and apply the right analytical techniques and context. Different methods of analysis can be applied to make smarter, more Figure 1: Big data enhances identity verification SITUATION-AWARE IAM BUILDS RICH USER PROFILES PASSIVE INPUT ACTIVE INPUT Geo IP location Device security health jdoe computer username certificates Wireless access points Typing pattern recognition Click stream patterns password mycat Wireless access points mobile device GPS location one-time Network location password Hardware token Software token On-demand token Access times physical access digital certificate Access location Organizational role HR systems out-of-band phone and privileges travel system Travel itineraries security questions “Which of the following people knowledge-based ???? do you meet with every Tuesday at 10:00 a.m.?” questions (multiple-choice list) Internal application SIEM access fingerprint Log data retina Internal threats biometric iris authentication facial recognition external typing recognition IP blacklists sources voice recognition External threats handwriting recognition RSA Security Brief page 4
  • 5. RSA Security Brief, January 2013 targeted types of decisions. Once these analytics are finely tuned, they can inform controls on the network to take action: lock accounts down, quarantine systems, change network device settings, require a second form of authentication, or tip off a fraud- monitoring system, for example. This increased automation reduces the workload for security analysts while accelerating the identification and mitigation of security threats. When big data drives security, the result is a unified, self-evolving approach and a holistic awareness that discrete, stitched-together solutions can’t begin to achieve. A big data-driven security model has the following characteristics: Author Commentary • Diverse data sources – both internal and external – that multiply in value and create a synergistic learning effect as new security-related information is added “Collecting big data is the easy • Automated tools that collect diverse data types and normalize them so they’re usable part. Understanding the data is by analytics engines the hard part. It’s best to start out • Analytics engines capable of processing vast volumes of fast-changing data in real time working on a sub-problem: for • Advanced monitoring systems that continuously examine high-value systems and resources and make assessments based on behavior and risk models, not on static example pinpoint the command threat signatures and control center of a botnet, • Active controls such as requiring additional user authentication, blocking data and then take that information transmissions or facilitating analysts’ decision-making when high-risk activity is detected and correlate it against, say, • Centralized warehouse where all security-related data is made available for security connection information in your analysts to query, either as a unified repository or, more likely, as a cross-indexed series organization, to get better of data stores situational awareness.” • Standardized views into indicators of compromise that are created in machine-readable form and can be shared at scale by trusted sources – Engin Kirda, Northeastern University • N-tier infrastructures that create scalability across vectors such as geography, storage and databases and have the ability to process large and complex searches and queries • High degree of integration with security- and risk-management tools to facilitate detailed investigations of potential problems by analysts and to trigger automated defensive measures such as blocking network traffic, quarantining systems or requiring additional verification of user identity When big data drives security, the result is greatly enhanced visibility into IT environments and the ability to distinguish suspicious from normal activities to inspire trust in our IT systems. RSA Security Brief page 5
  • 6. RSA Security Brief, January 2013 BIG DATA TRANSFORMS SECURITY APPROACHES The quality and value of insight that can be derived from big data analytics is expected to Author Commentary spur dramatic changes in almost every discipline within information security. The changes “The game is changing. More and have already begun, with an immediate need for advanced analytics arising in threat monitoring and incident investigations. These processes draw information from a variety more data is going onto the Internet of sources, analyzing both fresh and archived data to get a fuller, deeper view of security conditions (see Figure 2). in automated forms, and that vector Leading-edge security operations centers (SOCs)—especially those in defense and will continue. Therefore a security financial services organizations—are already discovering value from applying analytics to analysis tool that worked great two large sets of security data. They’re analyzing massive archives of security data to understand attackers’ techniques and to uncover subtle indicators that could help or three years ago doesn’t work so identify hidden threats faster, track cyber adversaries and perhaps even predict future well anymore. You now have to look attacks. They’re applying fraud analysis techniques to reduce unauthorized access to user accounts and corporate resources. through a whole lot more data, and While big data analytics tools for security were often custom-built in the past, this year you have to look for threats that are leading security organizations will deploy commercial, off-the-shelf big data solutions in far more subtle. Commercial tools their SOCs. Within two years, we predict big data analytics will have disruptive impact on many categories in the information security sector, including SIEM; network monitoring; are changing to take advantage user authentication and authorization; identity management; fraud detection; and of these big data streams coming governance, risk and compliance systems. Longer term, big data is also expected to change the nature of conventional security controls such as anti-malware, data loss online.” prevention and firewalls—essentially the entire security spectrum. – William H. Stewart, Booz Allen Hamilton Figure 2: Security investigations rely on big data Network/Host Web Transactions Infrastructure Information Identity Traffic Are there traffic Has suspicious Has the server been What kind of data Which users are anomalies to/from activity been manipulated? does this system logged in? these servers? observed in sensitive/ store, transmit, • Protocol Is it vulnerable? Has Have their privileges high value process? distribution? its configuration been escalated? applications and • Encryption? changed recently? Is this regulated assets? Where did they log in? • Suspicious information? High- Potential sources: Is it compliant with destinations? value IP? What other assets did • Authentication data policy? Potential sources: these users touch? Potential sources: • Transaction Potential sources: • DLP • SIEM monitoring Potential sources: • IT assets • Data classification • Network monitoring • Application logs • Authentication data • GRC systems • GRC systems • Application • SQL server logs • Microsoft Active • Configuration monitoriing • Network session data Directory® management • Vulnerability • Server logs management • Asset management • SIEM • Network monitoring RSA Security Brief page 6
  • 7. RSA Security Brief, January 2013 Security management SIEM and network monitoring capabilities have begun converging, creating a security analytics platform capable of massive and diverse real-time data collection and threat analysis. Security management driven by big-data analysis creates a unified view of multiple data sources and centralizes threat research capabilities, instead of forcing security analysts to deal with disparate tools that disrupt and potentially derail their workflows. The convergence of SIEM and network monitoring capabilities creates a unified security management system to assimilate all information that could possibly inform security. It ingests external threat intelligence and also offers the flexibility to integrate security data from existing technologies. Data processing happens on a much grander scale: today in the SIEM space, tools are capable of correlating thousands of Author Commentary events per second; going forward, security management platforms will correlate hundreds of thousands, even millions, of events per second without the need to expand the “In the coming year, top-tier hardware footprint. enterprises with progressive security Identity and access management (IAM) capabilities are expected to adopt Next-generation tools enable risk-based, adaptive identity controls that continuously intelligence-driven security models evaluate and adjust the level of protection and access based on asset criticality and risk. based on big data analytics. Over By enabling situation-aware IAM, such tools provide continuous risk assessment of user activity, especially when accessing sensitive resources, even after initial authentication. the next two or three years, we think Profiles are based on historical behavior; a deep, complex user profile; a richer view of that this security model will become identities and a data-driven perspective of what normal behavior looks like. much more widely adopted.” Provisioning is done on demand, based on enforcement policies that are created on the fly. Today, access control is based on rigid policies that say this person is allowed to do —Eddie Schwartz specific things. Next-generation access control systems acknowledge that an organization RSA, The Security Division can’t foresee all possible scenarios and instead allows operators to describe the kind of of EMC behavior that’s desired, with the system working out the related rules. Fraud prevention Whether it’s financial fraud, transaction fraud or the fraudulent use of corporate resources, advanced security technologies analyze massive amounts of behavioral data and other diverse indicators to distinguish between malicious and legitimate business activities. We predict that session intelligence and behavioral and click-stream analysis will combine to stop business logic abuse in which attackers find a flaw in the functioning of an IT-based system and exploit it for illicit gain. Governance, risk and compliance (GRC) As organizations expand the scope of their GRC programs—bridging organizational siloes and business functions with a unified GRC system—the amount of data that such systems can handle will need to grow exponentially. We predict that GRC platforms will evolve to provide real-time access to the entirety of information relevant to understanding business risks and to prioritizing security activities. They’ll analyze larger volumes of data to facilitate better, smarter decisions about the level, sources and criticalities of risk facing an organization. They’ll also inform SOCs about valuable assets that are at high levels of risk and help prioritize steps that an organization should take to mitigate those risks. RSA Security Brief page 7
  • 8. RSA Security Brief, January 2013 In addition to transforming existing categories of security tools, we also believe that big data will inspire the development of new tools that have yet to be conceived. Tools driven by big data security analytics will inform where and when to apply controls—or how to change them—to better protect information, identities and infrastructure. BUILDING A BIG DATA SECURITY PROGRAM Integrating big data analytics into security operations—the cornerstone of an intelligence- driven security model—will require organizations to rethink how security programs are Author Commentary developed and executed. In updating security programs to take advantage of big data, organizations should consider the following steps: “Until very recently in security 1. Set a holistic cyber security strategy – Organizations should align their security we’ve had to do all sorts of capabilities behind a holistic cyber security strategy and program that’s customized complicated things to filter, for the organization’s specific risks, threats and requirements. The security strategy preprocess and ultimately reduce should integrate big data analytics as part of a broader array of technical solutions, combined with tailored processes and expert staff. In most cases, a detailed our visibility to get down to a assessment of an organization’s current security posture, including an industry peer manageable data set, perform comparison, lays the groundwork for an effective cyber security program. analytics and make decisions. 2. Establish a shared data architecture for security information – Because big data But with extremely high-speed, analytics require information to be collected from various sources in many different formats, a single architecture that allows all information to be captured, indexed, scalable big data platforms, we normalized, analyzed and shared is a logical goal. have a much richer set of visibility 3. Migrate from point products to a unified security architecture – Developing a unified tools to begin the whole security security analytics framework will require a big-picture, more disciplined approach to process. Once you have the data security investments than most organizations have shown in the past. Organizations need to think strategically about which security products they will continue to support in the platform, you can then go and use over several years, because each product will introduce its own data structure through a number of different that must be integrated into a unified analytics framework for security—or deliberately analytical methods and techniques, omitted as a potential blind spot. In many cases, the TCO benefits of unifying the data architecture for security analytics may outweigh the benefits of preserving existing based on what you’re trying to point products. Conversely, if a particular product isn’t compatible with a given accomplish.” security data architecture, it’s unlikely to deliver long-term value. – Amit Yoran 4. Look for open and scalable big data security tools – Organizations should ensure that RSA, The Security Division of EMC ongoing investments in security products favor technologies using agile analytics- based approaches, not static tools based on threat signatures or network boundaries. New, big data-ready tools should offer the architectural flexibility to change as the business, IT or threat landscape evolves. RSA Security Brief page 8
  • 9. RSA Security Brief, January 2013 5. Strengthen the SOC’s data science skills – While emerging security solutions will be big data ready, security teams may not be. Data analytics is an area where on-staff talent is lacking: a recent survey conducted by IDC-Computerworld of analytics professionals found that 70 percent identified “lack of a sufficient number of staff with analytics skills” as a key challenge to delivering a successful business intelligence and analytics solution in their organizations.1 Security leaders should consider adding data scientists to their teams. Such specialists will not only need to manage the organization’s big data capabilities efficiently, but they will also need to understand Author Commentary business risks and cyber-attack techniques in sufficient depth to develop analytical models that detect, and even predict, illicit activities. Data scientists with specialized “Defending against sophisticated knowledge in security are scarce, and they will remain in high demand. As a result, many organizations are likely turn to outside partners to supplement internal security adversaries requires advanced analytics capabilities. analytics to help narrow the field 6. Leverage external threat intelligence – Augment internal security analytics programs and focus around advanced with external threat intelligence services. Often threat indicators, attack forensics or threats. This technology is intelligence feeds from outside sources are not machine-readable and require extensive manual processing by SOC analysts. SOCs should evaluate service providers necessary to help analysts solve aggregating threat data from many trustworthy, relevant sources. Data from these the hardest security problems. sources should be in formats that can be automatically ingested by security analytics You’re reacting to a mind and a platforms for correlation with internal data. person, and therefore you need creative and empowered people to defend yourself. Analytics tools inform analysts, provide scale and identify patterns of behavior too subtle to be otherwise observed.” – William H. Stewart Booz Allen Hamilton RSA Security Brief IDC Link: Analytics Education – Does One Size Fit All?, Doc #lcUS23882612, December 2012 1 page 9
  • 10. RSA Security Brief, January 2013 LOOKING AHEAD: BIG DATA IN FIVE YEARS? Author Commentary If many information security products are enhanced with big data analytics within the next couple of years, what will happen down the road when such products take root and “Traditional security controls are are broadly deployed? In the next three to five years, we predict data analytics tools will like a machine that you put a advance rapidly and enable the following security capabilities: recipe into and they always make • Security analysts will be able to use tools with intuitive interfaces to spot relationships among data sets and create correlations that build upon themselves, exactly the thing that you ask for. painting the most complete security picture possible. The new security world is like • SOCs will gain the requisite expertise, processes and tools to make the most of the looking in your fridge and having security data available to them. They consistently collect data from the right internal and external sources and use analytics to detect many, if not most, attacks and it tell you, based on what’s prevent unwanted outcomes. Some SOCs will develop advanced data models that are available, what would taste good accurate enough to predict certain types of cyber attacks. and then it makes it for you. For • Data analytics systems will empower users with decision-support capabilities at crucial times—usually before damage can be done. Analytics systems will inform real- example, think about adaptive time decision making, triggering automated tools such as risk-aware user access control, cutting off the authentication systems or notifying SOC analysts so they can take action based on detailed reports of what’s happening in the moment. bad guys before they have even • Security management tools will automatically share relevant threat data with trusted gotten into the network because partners and creatively reuse big data in different security scenarios. you can tell where they’re going Big data analytics, when used within an intelligence-driven security program, automates to be. That’s cool stuff.” many risk assessments and threat detection processes and puts the advantage of time back in an organization’s hands. Big data analytics also help enhance situational – Sam Curry awareness and shorten reaction times to potential risks and problems. We believe it will RSA, The Security Division prove instrumental in helping the global security community bring about a more trusted of EMC digital world. RSA Security Brief page 10
  • 11. RSA Security Brief, January 2013 About the Authors Sam Curry Sam Curry has more than 20 years of experience in security product management and Chief Technology Officer, Identity development, marketing, engineering, quality assurance, customer support and sales. His and Data Protection business unit experience also includes cryptography and research, and he is a regular contributor to a Chief Technologist number or journals and periodicals. Prior to his current role, Mr. Curry was CTO, Market- RSA, The Security Division of EMC ing and Vice President of Product Management at RSA, charged with leading the strategic direction for all RSA solutions. Before joining RSA, Mr. Curry was Vice President of Product Management and Marketing for a broad information security management portfolio at CA. Previously, Mr. Curry served as Chief Security Architect and led Product Marketing and Product Management at McAfee. He holds degrees in English and Physics from the University of Massachusetts and from Mount Allison University and has founded success- ful security startups. Engin Kirda Engin Kirda is the Sy and Laurie Sternberg Associate Professor of Information Assurance at The Sy and Laurie Sternberg Associate Northeastern University and also holds the position of director of the Northeastern Infor- Professor of Information Assurance mation Assurance Institute. Previously, Dr. Kirda held faculty positions at Institute Eurécom Northeastern University on the French Riviera and the Technical University of Vienna, where he co-founded the Secure Systems Lab that is now distributed across five institutions in the U.S. and Europe. Dr. Kirda is interested in systems, software and network security with specific focus on web security, binary analysis and malware detection. He is a co-founder and Director of Re- search at Lastline, a company specializing in advanced threat detection based on cutting- edge research conducted at Northeastern University. Eddie Schwartz Eddie Schwartz is Chief Information Security Officer for RSA and has 25 years of experience Vice President and Chief Information in the information security field. Previously, he was Co-Founder and Chief Security Officer Security Officer of NetWitness (acquired by EMC), CTO of ManTech, EVP and General Manager of Global In- RSA, The Security Division of EMC tegrity (acquired by INS), SVP of Operations of Guardent (acquired by VeriSign), CISO of Na- tionwide Insurance, a Senior Computer Scientist at CSC, and a Foreign Service Officer with the U.S. Department of State. Mr. Schwartz has advised a number of early stage security companies, and served on the Executive Committee for the Banking Information Technol- ogy Secretariat (BITS). Mr. Schwartz has a B.I.S. in Information Security Management and an M.S. in Information Technology Management from the George Mason University School of Management. William H. Stewart William Stewart is a Booz Allen Hamilton senior vice president with more than 25 years Senior Vice President of professional experience designing, developing and deploying cyber solutions. In his Booz Allen Hamilton current role, he leads the Cyber Technology Center of Excellence (COE), which includes more than 3,000 staff and provides consulting and systems integration expertise to public and private sector clients. Mr. Stewart and his team offer strategy and implementation for today’s most complex security problems. Prior to joining Booz Allen Hamilton, Mr. Stewart worked for a major electronics firm and also served as a signal officer in the U.S. Army. Mr. Stewart holds a MS in Electrical Engineering from Drexel University and a BS in Engineering from Widener University. Amit Yoran Amit Yoran oversees RSA’s Security Management and Compliance business unit. He is a Senior Vice President Commissioner of the CSIS Commission on Cyber Security advising the 44th Presidency and General Manager, Security Management & serves on several industry and national advisory bodies. Mr. Yoran came to RSA through Compliance business unit EMC’s acquisition of NetWitness in 2011. Prior to NetWitness, Mr. Yoran served as Director RSA, The Security Division of EMC of the National Cyber Security Division at the Department of Homeland Security. Formerly, he served as the Vice President of Worldwide Managed Security Services at the Symantec Corporation. Mr. Yoran was the co-founder of Riptech, a market-leading IT security com- pany, and served as its CEO until the company was acquired by Symantec in 2002. He also served as an officer in the U.S. Air Force in the Department of Defense’s Computer Emergency Response Team. Mr. Yoran received a Master of Science degree from the George Washington University, a Bachelor of Science from the United States Military Academy at West Point, and an honorary Doctorate from the University of Advancing Technology. RSA Security Brief page 11
  • 12. RSA Security Brief, January 2013 SECURITY SOLUTIONS & PROGRAMS The offerings described below align with the recommendations presented in this RSA Security Brief. The following overview of products and programs is not intended to provide a comprehensive list of applicable solutions. Rather, it’s intended to serve as a starting point for security technology practitioners and compliance officers wanting to learn about some of the options available to them. From Booz Allen Hamilton Booz Allen Hamilton (Booz Allen) helps clients evolve cyber security programs to reduce risk to their business operations and critical digital assets posed by increasingly severe cyber threats. Booz Allen’s approach is informed by a deep understanding of sophisticated adversary behavior, anchored by the current state of the art in cyber security technology and practice, and balanced with a strong focus on clients’ business needs. Booz Allen’s Intelligence Driven Dynamic Defense Framework helps clients shift from largely static, perimeter-based cyber defenses to active, operationally focused capabilities that employ big data analytics capable of anticipating and reacting to evolving threats. Booz Allen’s Intelligence Driven Dynamic Defense Framework includes the following offerings: Threat Intelligence: Booz Allen’s Cyber4Sight™ managed service delivers predictive cyber threat intelligence 24 hours a day, 7 days a week. Cyber4Sight delivers near- real-time cyber threat intelligence to protect clients’ entire business operations across the global Internet. The service correlates anomalies observed within our clients’ networks with the techniques, motivations, objectives and intentions seen in human cyber threat actors across the globe. Incident Response: Booz Allen provides full-suite triage capabilities, with experts in critical response delivering effective solutions for DDoS, insider threats, advanced persistent threat compromises and other security breaches. Incident response services are often enhanced with Automated First Responder (AFR), a non-signature- based approach to uncovering an adversary’s presence, threat origins, and the methods for controlling and remediating attackers’ activities while preventing further intrusions. Preemptive Response: Booz Allen leverages its long heritage as a management and technology consulting firm to help clients gain a greater understanding of the business challenges and opportunities related to cyber security programs. Our preemptive response services are built around our Cyber M3: Measure, Manage, and Mature model. Booz Allen offers a range of Cyber M3 diagnostic and strategy services to help clients advance their security capabilities. At the premier level, services help clients: 1) create holistic cyber security programs aligned with business needs, 2) develop a balanced portfolio of complementary capabilities, and 3) prioritize how to satisfy the diverse needs of stakeholders through justifiable resource expenditures. RSA Security Brief page 12
  • 13. RSA Security Brief, January 2013 Integrated Remediation: Booz Allen uses a multi-disciplinary approach encompassing policy, operations, technologies, management and people to synchronize remediation efforts. This ensures that cyber protection is fully integrated and effectively achieved. Booz Allen services range from “design” partnerships, in which Booz Allen experts work hand-in-hand with clients to develop comprehensive capabilities (e.g., End-to-End Hunt Team Operational Operating Models), to “implementation” engagements, in which Booz Allen provides world-class services in execution and delivery of cyber services (e.g., PKI solution integrations, network segmentations, etc.). From Northeastern University Northeastern University offers Master of Science and Ph.D. programs in Information Assurance (IA). The specialized field of IA protects information systems by ensuring data privacy and integrity, user authenticity and legitimate use of system resources. IA professionals understand the relationships between information technology and people, systems, society, policy and law. Northeastern University’s interdisciplinary IA programs are offered jointly by the College of Computer and Information Science, the College of Engineering and the College of Social Sciences and Humanities and are the only such programs in New England. Program graduates typically work in government agencies, as well as in commercial and financial organizations. The National Security Agency/Department of Homeland Security has designated Northeastern University as a Center of Academic Excellence in Information Assurance Research and Education. From RSA RSA® Adaptive Authentication, with its advanced self-learning risk engine, calculates a risk score based on the user behavior profile, the device profile and the eFraudNetwork™ match. This risk score is provided to a policy engine and the user is either granted access, required to provide an alternate authentication credential or denied access. RSA Adaptive Authentication is a proven solution protecting thousands of organizations and users worldwide today. The RSA Advanced Cyber Defense Practice provides a complete range of innovative consulting and professional services to organizations needing to mitigate cyber threats while pursuing their business objectives. Using RSA’s proven Total Threat Visibility & Mitigation methodology, practice consultants help organizations strengthen their operational security programs by optimizing how their people, processes and technology solutions work together. Consulting services include conducting breach readiness assessments to minimize exposure to attacks; fortifying approaches to identity/access management; unifying governance, risk and compliance practices; and redesigning SOCs/CIRCs. The RSA Advanced Cyber Defense Practice also provides expert counsel and hands-on assistance with all aspects of advanced threat detection, response and remediation. RSA Security Brief page 13
  • 14. RSA Security Brief, January 2013 RSA® Archer™ GRC Suite is the market-leading solution for managing enterprise governance, risk and compliance (GRC). It provides a flexible, collaborative platform to manage enterprise risks, automate business processes, demonstrate compliance and gain visibility into exposures and gaps across the organization. The RSA Archer GRC platform is designed to draw data from a wide variety of systems to serve as a central repository for risk-, compliance- and security-related information. The RSA Archer Threat Management solution is an early-warning system for tracking threats. The RSA Archer Incident Management solution helps organizations escalate problems, track the progress of investigations and coordinate problem resolution. The platform’s ability to integrate information on security alerts and threats, to gather and present metrics about the effectiveness of security controls and processes and to analyze contextual information about the security and business environment helps create actionable, real-time intelligence across the enterprise. RSA® Cloud Trust Authority (CTA) is a collection of cloud-based services to simplify and enhance identity, information and cloud infrastructure security, as well as compliance reporting. With RSA Cloud Trust Authority, public cloud service providers and their customers do not need to establish individual point-to-point integrations to establish trust; instead, participants can establish many cloud security relationships simultaneously through a single integration with the CTA service. Enterprises can manage secure user access and user provisioning to multiple public cloud service providers via federated single sign-on and directory synchronization with options for strong authentication. The RSA Live platform operationalizes threat intelligence by consolidating information from the global security community and fusing these external data sets with an organization’s internal data. The platform gathers security information from the industry’s most trusted and reliable sources, including proprietary RSA FirstWatch research. RSA’s expert security analysts consolidate and evaluate threat data from diverse sources to illuminate the information most relevant to your organization. The data is then distributed and operationalized via correlation rules, blacklists, parsers, views and feeds. This automated approach allows organizations to take advantage of the intelligence that others have already found and to discern what they should look for in applying threat intelligence to current and historical data. RSA Security Brief page 14
  • 15. RSA Security Brief, January 2013 RSA® Security Analytics is designed to provide organizations with the situational awareness needed to deal with their most pressing security issues. By offering enterprise-wide visibility into network traffic and log event data, the RSA Security Analytics system can help organizations gain a comprehensive view of their IT environment, enabling security analysts to prioritize threats quickly, investigate them, make remediation decisions and take action. The RSA Security Analytics solution’s distributed data architecture is engineered to collect and analyze massive volumes of information – hundreds of terabytes and beyond – at very high speed using multiple modes of analysis. The solution is also capable of integrating external threat intelligence about the latest tools, techniques and procedures in use by the attacker community and of helping organizations track and manage responses to security issues identified through the solution. The RSA Security Analytics platform is planned for commercial release in early 2013. RSA® Silver Tail software and SaaS solutions protect organizations from cyber attack, cybercrime, and fraud by analyzing web sessions and mobile traffic to distinguish suspicious or malicious activities from legitimate ones. The Silver Tail platform collects and analyzes massive amounts of real-time data from web and mobile traffic to power the platform’s behavioral analysis engine. The behavioral analysis engine creates heuristics and rules to learn the typical conditions and behaviors within any IT-based system and to detect anomalies that signal IT security threats, fraud, insider threats, business logic abuse and other malicious activity.  RSA Security Brief page 15
  • 16. RSA Security Brief, January 2013 ABOUT RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, data loss prevention, continuous network monitoring, and fraud protection with industry leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.RSA. com and www.EMC.com. ©2013 EMC Corporation. All rights reserved. EMC2, EMC, the EMC logo, Archer, eFraudNetwork, RSA and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. Booz Allen Hamilton, Booz Allen and Cyber4Sight are the registered and/or unregistered service marks or trademarks of Booz Allen or its licensors. Active Directory, Microsoft and Outlook are registered trademarks of Microsoft. All other products or services mentioned are trademarks of their respective companies. www.rsa.com 168628 H11437 BD BRF 0113