Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Big Data For Information Security

460 views

Published on

Presentation to CSO/CISO explaining Big Data and its possible use in the context of information security. This presentation emphasizes the importance of governance, privacy and compliance when considering big data for security, and the need to focus on Intelligence Augmentation.

Contact author directly for more information and slide comments.

Published in: Technology
  • Be the first to comment

Big Data For Information Security

  1. 1. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Big Data for Security Information Security Forum – 25/06/2013 FX Nicolas VP Products @ Semarchy @fxnicolas| fx.nicolas@semarchy.com
  2. 2. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved THE BIG, THE BAD, THE UGLY
  3. 3. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved 3 Vs •Velocity – « Tweet » ! •Volume - Pentabytes (1015) to Zetabytes (1021) •Variety (un/semi- structured) Technologies •Hadoop (HDFS, Map/Reduce, Hiv e, Mahout) •+Cloudera •NoSQL, R Data Sources •Existing (untapped data sources, too big for DBs) •New Sensors (mobile) •Social (±veracity) •Cloud •And more… All of Big Data in One Small Slide 3 THE Data Scientist
  4. 4. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved About Security 4 SIEM IAM GRC Fraud
  5. 5. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Security: Faster, Bigger, Stronger 5
  6. 6. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Forensic (Works, but too late!) 6
  7. 7. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Predictive (Not as simple as in movies) 7 Big data has no prediction magic. It lets you leverage resources untapped before. 1
  8. 8. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Small & Big Data Sources  Physical Access Time/Locations  Travel Itineraries  Network Monitoring Logs  Web Transaction & Access, SQL Logs, Session Data  Authentication  Network Access, Wireless, GPS, Geo IP Location  Mobile Devices  Biometric Small Volume of « Key Data »  Policies, Roles, Privs.  Assets  Identities / People 8 Large Volume of « Data » Without « Small Key Data » to structure the analysis, Big Data is just « Big Garbage ». 2
  9. 9. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Compliance & Privacy The Challenge (not to fall on the dark side) 9 “With great power comes great responsibility” - Stan Lee 3
  10. 10. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Data Governance is an initiative to manage the availability, usage, accuracy, integrity and security of your data. 10
  11. 11. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved You (still) need a brain. Here is why. 11
  12. 12. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Thank you Mr. Petrov! For saving the world (and for reminding me how dumb computers are) 12
  13. 13. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved “The Chess Master and the Computer” 13 Empower Security Analysts with Data Science skills. Think Intelligence Amplification, not Replacement. 4 The Chess winning combo: 2 avg. human players + 3 avg. machines + good interaction !
  14. 14. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved QUESTIONS? 14
  15. 15. Copyright © 2013 Semarchy and/or its affiliates. All rights Reserved Web: www.semarchy.com Twitter: @Semarchy Google+ | LinkedIn | YouTube |Facebook Contact Us

×