Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
1. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
1
Modeling Cybersecurity Cases
with Graph Data Models
Gal Bello
Field Engineering, Israel
2. Neo4j, Inc. All rights reserved 2023
❖ Hello!
❖ Cybersecurity
➢ The Problem, the Graph Solution
➢ Real-life Insights
❖ Graph Data Modeling
➢ Real-Life Modeling Examples
➢ Cybersecurity Graph Modeling
Practice
❖ Q&A
❖ Goodbye!
Agenda
3. Neo4j, Inc. All rights reserved 2023
Gal Bello
Field Engineering, Israel
@Gal_Bello
Linkedin.com/in/galbello/
What’s the thing you like most about Neo4j?
“Neo4j is not just only one of the most innovative companies around the globe, it also leads a
positive cultural approach to its employees, customers, partners and community members:
Diversity & inclusion, open minded, acceptance & positiveness assumption.”
4. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
CYBERSECURITY
4
5. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
5
“Cybersecurity is the practice of defending
computers, servers, mobile devices, electronic
systems, networks, and Data from malicious
attacks.”
“
(Wikipedia)
Cyber
Security
Cybersecurity
What is Cybersecurity?
6. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
6
“Cybersecurity is the practice of defending
computers, servers, mobile devices, electronic
systems, networks, and Data from malicious
attacks.”
“
(Wikipedia)
Cyber
Security
Cybersecurity
What is Cybersecurity?
7. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
THE PROBLEM
7
8. Neo4j, Inc. All rights reserved 2023
Cybersecurity analysts have to capture, store,
analyze and potentially explore vast amounts of
rapidly evolving information.
The Problem:
9. Neo4j, Inc. All rights reserved 2023
Cybersecurity analysts have to capture, store,
analyze and potentially explore vast amounts of
rapidly evolving information.
The Problem:
10. Neo4j, Inc. All rights reserved 2023
Cybersecurity analysts have to capture, store,
analyze and potentially explore vast amounts of
rapidly evolving information.
The Problem:
11. Neo4j, Inc. All rights reserved 2023
Cybersecurity analysts have to capture, store,
analyze and potentially explore vast amounts of
rapidly evolving information.
The Problem:
12. Neo4j, Inc. All rights reserved 2023
Cybersecurity analysts have to capture, store,
analyze and potentially explore vast amounts of
rapidly evolving information.
The Problem:
13. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
GRAPH SOLUTION
13
14. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
WHAT IS A GRAPH?
vs
15. Neo4j, Inc. All rights reserved 2023
A Graph Is...
...a set of discrete entities, each of which has some set of relationships with the
other entities
16. Neo4j, Inc. All rights reserved 2023
A Graph Is...
...a set of discrete entities, each of which has some set of relationships with
the other entities
Seven Bridges of Konigsberg problem. Leonhard Euler, 1735
17. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
WHEN
17
18. Neo4j, Inc. All rights reserved 2023
It’s Not only What You Know
19. Neo4j, Inc. All rights reserved 2023
It’s How is it Connected
20. Neo4j, Inc. All rights reserved 2023
It’s How is it Connected and Shines Out
21. Neo4j, Inc. All rights reserved 2023
Digitized and Analog
World of Cybersecurity
Constantly Evolving Few and Many Players
“One Step Ahead”
Simple and Complex
Organized in
groups
Synthetic
Identities
Stolen
Identities
Hijacked
Devices
22. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
Pattern 1 Pattern 2
Detect and Respond (React!)
Raw Data Anomalies
Cybersecurity Prevention
is About
Reacting to
Patterns
(and doing it fast!)
23. Neo4j, Inc. All rights reserved 2023
INVESTIGATE
Revolving Debt
Number of Accounts
INVESTIGATE
Normal behavior
Cybersecurity – With District Analysis
24. Neo4j, Inc. All rights reserved 2023
Revolving Debt
Number of Accounts
Normal behavior
Cyber Attackers Pattern
Cybersecurity – With District Analysis
26. Neo4j, Inc. All rights reserved 2023
Graph Database could assist companies secure
their data, by leveraging the connections within the
datasets.
The Solution:
27. Neo4j, Inc. All rights reserved 2023
Graph Database could assist companies secure
their data, by leveraging the connections within
the datasets.
The Solution:
28. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
REAL-LIFE INSIGHTS
28
29. Neo4j, Inc. All rights reserved 2023
Around is
expected to be spent
on CS by 2023
$6T
30. Neo4j, Inc. All rights reserved 2023
The Cybersecurity
market worth is: $155B
31. Neo4j, Inc. All rights reserved 2023
of
Cybersecurity marketshare
is for Financial Services
and Insurances
20%
32. Neo4j, Inc. All rights reserved 2023
Every seconds
there is a hacker attack
39
33. Neo4j, Inc. All rights reserved 2023
The average cost of a
data breach is
across SMBs
$3.9M
34. Neo4j, Inc. All rights reserved 2023
of malware is
delivered using email
92%
35. Neo4j, Inc. All rights reserved 2023
of Cybersecurity
breaches are due to
Human error
39%
36. Neo4j, Inc. All rights reserved 2023
of
Cyber attacks target
Enterprise companies
57%
37. Neo4j, Inc. All rights reserved 2023
experienced
phishing & social
engineering attacks
62%
38. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
GRAPH DATA
MODELING
38
39. Neo4j, Inc. All rights reserved 2023
Graph Data Modeling is a collaborative effort by different
Stakeholders and Developers.
What is Graph Data Modeling?
The application domain will be analyzed by all stakeholders, developers and participants
to develop a Graph Data Model that will support and answer all “Money” queries.
43. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
MODELING EXAMPLE
43
44. Neo4j, Inc. All rights reserved 2023
Law
Enforcement
Use Case:
Information and Data
Synchronization in
Law Enforcement
Law Enforcement Agencies use
Neo4j to model the information
into graphs to improve efficiency
and make direct and implicit
patterns readily apparent in real
time.
A suspect often appears in several
different databases
Financial records
Convictions
Adresses
Vehicles
Traffic cameras
Arrests
Police Reports
Appears_in
Has
H
a
s
H
a
s
Owns Registered
SUSPECT
Has
45. Neo4j, Inc. All rights reserved 2023
SSN 2
ACCOUNT
HOLDER 2
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
ADDRESS
PHONE
NUMBER
PHONE
NUMBER
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
Banking
Use Case:
Modeling Fraud
Rings as Graphs
Organizing a fraud ring in the real
world is relatively simple. A group of
people share their personal
information to create synthetic
identities. For example with just 2
individuals sharing names and social
security numbers can create 4
different identities. This can be
discovered with connected analysis.
46. Neo4j, Inc. All rights reserved 2023
Government
• Better Services
• More Consistency
• Saves Time
• Coordinates Efforts
MARRIED_TO
L
I
V
E
S
_
A
T
LIVES_AT
FATHER_OF
ENROLLED_IN
OWNS
OWNS
ID#
PHONE
EMAIL
H
A
S
HAS
HAS
MOTHER_OF
ID#
PHONE
EMAIL
47. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
BUILDING a
GRAPH DATA MODEL
47
48. Neo4j, Inc. All rights reserved 2023 01
Employee A
Employee B
Employee C
Employee D
Employee Z
49. Neo4j, Inc. All rights reserved 2023 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
50. Neo4j, Inc. All rights reserved 2023 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
51. Neo4j, Inc. All rights reserved 2023 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
BANK
ACCOUNT ADDRESS
52. Neo4j, Inc. All rights reserved 2023 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
BANK
ACCOUNT ADDRESS
PROJECT A PROJECT B
Project C
Department 200 Department 300
53. Neo4j, Inc. All rights reserved 2023 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account Address
Project C
Documents
Documents
54. Neo4j, Inc. All rights reserved 2023 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account Address
Project C
Documents
Documents
PRODUCTION
SERVERS
55. Neo4j, Inc. All rights reserved 2023 01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account
Address
Project C
Documents
Documents
PRODUCTION
SERVERS
:PUBLISHED_ON
:SAVED_ON
:WORKS_AT
:MANAGES
56. Neo4j, Inc. All rights reserved 2023
Cybersecurity
01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account
Address
Project C
Documents
Documents
PRODUCTION
SERVERS
:PUBLISHED_ON
:SAVED_ON
:WORKS_AT
:MANAGES
PHISHING
EMAILS
Hacker
57. Neo4j, Inc. All rights reserved 2023 01
Employee Z
HACKER
Project A
Department 22
Bank
Account
Address
Documents
PRODUCTION
SERVERS
Cybersecurity
PHISHING
EMAIL
PHISHING
EMAIL
PUBLISHED_ON
Employee A
Employee B
Employee C
Department 4
Project B Project C
58. Neo4j, Inc. All rights reserved 2023
Start Your Graph Journey
neo4j.com/cloud/aura-free/
Learn
neo4j.com/graphacademy/
neo4j.com/developer
udemy.com/course/neo4j-foundations/
Contact Us
Gal.Bello@Neo4j.com
Info@Neo4j.com
Now What
59. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
QUESTIONS
59
60. Neo4j, Inc. All rights reserved 2023
Neo4j, Inc. All rights reserved 2023
60
Thank you!
Gal Bello