SlideShare a Scribd company logo
Data Analytics for Security
Intelligence
Camil Demetrescu
Dept. Computer, Control, and Management
Engineering
Credits: Peter Wood, First Base Technologies LLP
Data Driven Innovation Rome 2016 – Open Summit
Roma Tre University, May 20 2016
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 2
Big data
Every day, we create 2.5 quintillion bytes of data.
90% of the data in the world today has been created in the
last two years alone.
http://www-01.ibm.c/software/data/bigdata/
2.5 quintillion = 2.5 exabytes = 2.5 x 1018 =
2.500.000.000.000.000.000 bytes
•  Sensors used to gather climate information
•  Posts to social media sites
•  Digital pictures and videos
•  Purchase transaction records
•  Cell phone GPS signals
20/5/2016Data Driven Innovation Rome 2016 Page 3
20/5/2016Data Driven Innovation Rome 2016 Page 4
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 5
Malware events per hour
20/5/2016Data Driven Innovation Rome 2016 Page 6
Organisations on average are
experiencing malware-related
activities once every three
minutes.
Receipt of a malicious email, a
user clicking a link on an
infected website, or an infected
machine making a call back to a
command and control server.
FireEyeAdvancedThreatReport2012
How breach occurred
20/5/2016Data Driven Innovation Rome 2016 Page 7
The Post Breach Boom, Ponemon Institute 2015
Survey of 3,529 IT and IT security practitioners
When the breach was discovered
20/5/2016Data Driven Innovation Rome 2016 Page 8
The Post Breach Boom, Ponemon Institute 2015
Survey of 3,529 IT and IT security practitioners
Reasons for failing to prevent the breach
20/5/2016Data Driven Innovation Rome 2016 Page 9
ThePostBreachBoom,PonemonInstitute2015
Surveyof3,529ITandITsecuritypractitioners
Extrapolated cost of breach
20/5/2016Data Driven Innovation Rome 2016 Page 10
ThePostBreachBoom,PonemonInstitute2015
Surveyof3,529ITandITsecuritypractitioners
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 11
Data driven information security: examples
20/5/2016Data Driven Innovation Rome 2016 Page 12
•  Analyze system/applications log files
•  Analyze network traffic
•  Identify anomalies and suspicious activities
•  Correlate multiple sources of information into a
coherent view
Why do we need big data systems?
20/5/2016Data Driven Innovation Rome 2016 Page 13
•  System Log files that can grow by gigabytes per
second
•  Network data captures, which can grow by 10s of
gigabytes per second
•  Intrusion Detection/Protection log files that can
grow by 10s of gigabytes per second
•  Application Log files that can grow by gigabytes per
second
http://www.virtualizationpractice.com/big-data-security-tools-22075/
Traditional scenarios
Traditional defences:
•  Signature-based anti-virus
•  Signature-based IDS/IDP
•  Firewalls and perimeter devices
Traditional approach:
•  Data collection for compliance
•  Check-list mindset
•  Tactical thinking
20/5/2016Data Driven Innovation Rome 2016 Page 14
New challenges
Complex threat landscape:
•  Stealth malware
•  Targeted attacks
•  Social engineering
New technologies and challenges:
•  Social networking
•  Cloud
•  BYOD / consumerisation
•  Virtualisation
20/5/2016Data Driven Innovation Rome 2016 Page 15
Conventional vs. advanced approaches
20/5/2016Data Driven Innovation Rome 2016 Page 16
http://www.emc.com/collateral/industry-overview/sbic-rpt.pdf
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 17
Data-driven information security:
early times
20/5/2016Data Driven Innovation Rome 2016 Page 18
•  Bank fraud detection and anomaly-based intrusion
detection systems.
•  Credit card companies have conducted fraud
detection for decades.
•  Custom-built infrastructure to mine big data for fraud
detection was not economical to adapt for other
fraud detection uses (healthcare, insurance, etc.)
Cloud Security Alliance
Data analytics for intrusion detection
20/5/2016Data Driven Innovation Rome 2016 Page 19
Intrusion detection systems – Security architects
realized the need for layered security (e.g., reactive
security and breach response) because a system
with 100% protective security is impossible.
1st
generation
2nd
generation
Security information and event management (SIEM)
– aggregate and filter alarms from many sources
and present actionable information to security
analysts.
3rd
generation
Big data analytics in security (2nd generation SIEM)
– correlating, consolidating, and contextualizing
diverse security event information, correlating long-
term historical data for forensic purposes
How can big data analytics help?
•  Advanced persistent threat (APT) detection?
•  Integration of IT and physical security?
•  Predictive analysis
•  Real-time updates
•  Behaviour models
•  Correlation
•  … advising the analysts?
•  … active defence?
20/5/2016Data Driven Innovation Rome 2016 Page 20
How can big data analytics help?
20/5/2016Data Driven Innovation Rome 2016 Page 21
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 22
Big data security challenges
•  Bigger data = bigger breaches?
•  New technology = security later?
•  Information classification
•  Information ownership (outputs and raw data)
•  Big data in cloud + BYOD = more problems?
20/5/2016Data Driven Innovation Rome 2016 Page 23
Big data security risks
•  New technology will introduce new vulnerabilities
•  Attack surface of the nodes in a cluster may not have been
reviewed and servers adequately hardened
•  User authentication and access to data from multiple
locations may not be sufficiently controlled
•  Regulatory requirements may not be fulfilled, with access to
logs and audit trails problematic
•  Significant opportunity for malicious data input and
inadequate data validation
20/5/2016Data Driven Innovation Rome 2016 Page 24
Big data privacy concerns
•  De-identifed information may be re-identified
•  Possible deduction of personally identifiable information
•  Risk of data breach is increased
•  "Creepy" Factor: consumers may feel that companies
know more about them than they are willing to volunteer
•  Big brother: predictive policing and tracking potential
terrorist activities. Harm individual rights or deny
consumers important benefits (such as housing or
employment) in lieu of credit reports.
http://www.ftc.gov/public-statements/2012/03/big-data-big-issues
Outline
•  Big data
•  Advanced threats – current situation
•  Why big data for security?
•  How can big data help?
•  Big data security challenges
•  Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 26
Conclusions
20/5/2016Data Driven Innovation Rome 2016 Page 27
•  As with all new technologies, security in big data use
cases seems to be an afterthought at best
•  Big data breaches will be big too, with even more
serious reputational damage and legal repercussions
•  All organisations need to invest in research and study of
the emerging big data security analytics landscape
•  Big data has the potential to defend against advanced
threats, but requires a big re-think of approach
•  Relevant skills are key to successful deployment, only the
largest organisations can invest in this now
Big data to collect
•  Logs
•  Network traffic
•  IT assets
•  Sensitive / valuable information
•  Vulnerabilities
•  Threat intelligence
•  Application behaviour
•  User behaviour
20/5/2016Data Driven Innovation Rome 2016 Page 28

More Related Content

What's hot

NewMR 2016 presents: 9 Big Applications of Big Data
NewMR 2016 presents: 9 Big Applications of Big DataNewMR 2016 presents: 9 Big Applications of Big Data
NewMR 2016 presents: 9 Big Applications of Big Data
Annie Pettit, Research Methodologist
 
The big data value chain r1-31 oct13
The big data value chain r1-31 oct13The big data value chain r1-31 oct13
The big data value chain r1-31 oct13
Rei Lynn Hayashi
 
Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science  Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science
suresh sood
 
Real time analytics of big data
Real time analytics of big dataReal time analytics of big data
Real time analytics of big data
Deependra Jyoti
 
Data Mining With Big Data
Data Mining With Big DataData Mining With Big Data
Data Mining With Big Data
Muhammad Rumman Islam Nur
 
Big Data Trends
Big Data TrendsBig Data Trends
Big Data Trends
David Feinleib
 
A Brief History of Big Data
A Brief History of Big DataA Brief History of Big Data
A Brief History of Big Data
Bernard Marr
 
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
European Data Forum
 
A Short History of Big Data
A Short History of Big DataA Short History of Big Data
A Short History of Big Data
Gadi Eichhorn
 
Designing experiences for the personal data box
Designing experiences for the personal data boxDesigning experiences for the personal data box
Designing experiences for the personal data box
Pierrick Thébault
 
Big data Presentation
Big data PresentationBig data Presentation
Big data Presentation
Aswadmehar
 
Big Data
Big DataBig Data
An Introduction to Big Data
An Introduction to Big DataAn Introduction to Big Data
An Introduction to Big Data
eXascale Infolab
 
Big Data & Implementasinya
Big Data & ImplementasinyaBig Data & Implementasinya
Big Data & Implementasinya
Anshar Abdullah
 
Datamarket: A Start-Up that will Change the World (with Open Data)
Datamarket: A Start-Up that will Change the World (with Open Data)Datamarket: A Start-Up that will Change the World (with Open Data)
Datamarket: A Start-Up that will Change the World (with Open Data)
Bo Olafsson
 
Big data
Big dataBig data
L18 Big Data and Analytics
L18 Big Data and AnalyticsL18 Big Data and Analytics
L18 Big Data and Analytics
Ólafur Andri Ragnarsson
 

What's hot (19)

NewMR 2016 presents: 9 Big Applications of Big Data
NewMR 2016 presents: 9 Big Applications of Big DataNewMR 2016 presents: 9 Big Applications of Big Data
NewMR 2016 presents: 9 Big Applications of Big Data
 
The big data value chain r1-31 oct13
The big data value chain r1-31 oct13The big data value chain r1-31 oct13
The big data value chain r1-31 oct13
 
Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science  Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science
 
Real time analytics of big data
Real time analytics of big dataReal time analytics of big data
Real time analytics of big data
 
Data Mining With Big Data
Data Mining With Big DataData Mining With Big Data
Data Mining With Big Data
 
Big Data Trends
Big Data TrendsBig Data Trends
Big Data Trends
 
A Brief History of Big Data
A Brief History of Big DataA Brief History of Big Data
A Brief History of Big Data
 
Big Data analytics
Big Data analyticsBig Data analytics
Big Data analytics
 
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
 
A Short History of Big Data
A Short History of Big DataA Short History of Big Data
A Short History of Big Data
 
Designing experiences for the personal data box
Designing experiences for the personal data boxDesigning experiences for the personal data box
Designing experiences for the personal data box
 
Big data Presentation
Big data PresentationBig data Presentation
Big data Presentation
 
Big Data
Big DataBig Data
Big Data
 
An Introduction to Big Data
An Introduction to Big DataAn Introduction to Big Data
An Introduction to Big Data
 
Smmart for partners
Smmart for partnersSmmart for partners
Smmart for partners
 
Big Data & Implementasinya
Big Data & ImplementasinyaBig Data & Implementasinya
Big Data & Implementasinya
 
Datamarket: A Start-Up that will Change the World (with Open Data)
Datamarket: A Start-Up that will Change the World (with Open Data)Datamarket: A Start-Up that will Change the World (with Open Data)
Datamarket: A Start-Up that will Change the World (with Open Data)
 
Big data
Big dataBig data
Big data
 
L18 Big Data and Analytics
L18 Big Data and AnalyticsL18 Big Data and Analytics
L18 Big Data and Analytics
 

Viewers also liked

Big data e prevenzione. Verso un minority report per gli incidenti
Big data e prevenzione. Verso un minority report per gli incidentiBig data e prevenzione. Verso un minority report per gli incidenti
Big data e prevenzione. Verso un minority report per gli incidenti
Data Driven Innovation
 
Network visualization for financial crime detection
Network visualization for financial crime detectionNetwork visualization for financial crime detection
Network visualization for financial crime detection
Data Driven Innovation
 
BigData: una nuova fonte per la ricerca storica
BigData: una nuova fonte per la ricerca storicaBigData: una nuova fonte per la ricerca storica
BigData: una nuova fonte per la ricerca storica
Data Driven Innovation
 
Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...
Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...
Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...
Data Driven Innovation
 
Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...
Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...
Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...
Data Driven Innovation
 
Open data e dintorni
Open data e dintorniOpen data e dintorni
Open data e dintorni
Data Driven Innovation
 
Mining the web to make hidden agricultural research globally discoverable: th...
Mining the web to make hidden agricultural research globally discoverable: th...Mining the web to make hidden agricultural research globally discoverable: th...
Mining the web to make hidden agricultural research globally discoverable: th...
Data Driven Innovation
 
I dati di consumo alimentari nei modelli dell'alimentazione sostenibile
I dati di consumo alimentari nei modelli dell'alimentazione sostenibileI dati di consumo alimentari nei modelli dell'alimentazione sostenibile
I dati di consumo alimentari nei modelli dell'alimentazione sostenibile
Data Driven Innovation
 
Dealing with climate complexity: from climate data to information
Dealing with climate complexity: from climate data to informationDealing with climate complexity: from climate data to information
Dealing with climate complexity: from climate data to information
Data Driven Innovation
 
Data Governance at work
Data Governance at workData Governance at work
Data Governance at work
Data Driven Innovation
 
OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...
OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...
OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...
Data Driven Innovation
 
Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...
Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...
Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...
Data Driven Innovation
 
Barilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change Era
Barilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change EraBarilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change Era
Barilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change Era
Data Driven Innovation
 
Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...
Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...
Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...
Data Driven Innovation
 
Knowledge graph: il percorso di Cerved per connettere i Big Data - Diego Sanvito
Knowledge graph: il percorso di Cerved per connettere i Big Data - Diego SanvitoKnowledge graph: il percorso di Cerved per connettere i Big Data - Diego Sanvito
Knowledge graph: il percorso di Cerved per connettere i Big Data - Diego Sanvito
Data Driven Innovation
 
Data driven innovation in chirurgia: il caso EVARplanning - Paolo Spada
Data driven innovation in chirurgia: il caso EVARplanning - Paolo SpadaData driven innovation in chirurgia: il caso EVARplanning - Paolo Spada
Data driven innovation in chirurgia: il caso EVARplanning - Paolo Spada
Data Driven Innovation
 
Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)
Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)
Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)
Data Driven Innovation
 
Security analytics
Security analyticsSecurity analytics
Security analytics
Simon Bennett
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analyticsDataWorks Summit
 

Viewers also liked (20)

Big data e prevenzione. Verso un minority report per gli incidenti
Big data e prevenzione. Verso un minority report per gli incidentiBig data e prevenzione. Verso un minority report per gli incidenti
Big data e prevenzione. Verso un minority report per gli incidenti
 
Network visualization for financial crime detection
Network visualization for financial crime detectionNetwork visualization for financial crime detection
Network visualization for financial crime detection
 
BigData: una nuova fonte per la ricerca storica
BigData: una nuova fonte per la ricerca storicaBigData: una nuova fonte per la ricerca storica
BigData: una nuova fonte per la ricerca storica
 
Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...
Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...
Polyglot Persistence e Big Data: tra innovazione e difficoltà su casi reali -...
 
Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...
Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...
Implementazione di un servizio di Linked Open Data presso l'Istituto Nazional...
 
Open data e dintorni
Open data e dintorniOpen data e dintorni
Open data e dintorni
 
Mining the web to make hidden agricultural research globally discoverable: th...
Mining the web to make hidden agricultural research globally discoverable: th...Mining the web to make hidden agricultural research globally discoverable: th...
Mining the web to make hidden agricultural research globally discoverable: th...
 
I dati di consumo alimentari nei modelli dell'alimentazione sostenibile
I dati di consumo alimentari nei modelli dell'alimentazione sostenibileI dati di consumo alimentari nei modelli dell'alimentazione sostenibile
I dati di consumo alimentari nei modelli dell'alimentazione sostenibile
 
Dealing with climate complexity: from climate data to information
Dealing with climate complexity: from climate data to informationDealing with climate complexity: from climate data to information
Dealing with climate complexity: from climate data to information
 
Data Governance at work
Data Governance at workData Governance at work
Data Governance at work
 
OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...
OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...
OpenStreetMap - Sfide e opportunità degli open-geodata per creare contenuti a...
 
Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...
Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...
Roma, Data Driven city: come cambia la mobilità nell’era degli Open data e co...
 
Barilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change Era
Barilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change EraBarilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change Era
Barilla Sustainable Farming: a Smart Agriculture Tool in the Climate Change Era
 
Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...
Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...
Il paradigma dei Big Data e Predictive Analysis, un valido supporto al contra...
 
Knowledge graph: il percorso di Cerved per connettere i Big Data - Diego Sanvito
Knowledge graph: il percorso di Cerved per connettere i Big Data - Diego SanvitoKnowledge graph: il percorso di Cerved per connettere i Big Data - Diego Sanvito
Knowledge graph: il percorso di Cerved per connettere i Big Data - Diego Sanvito
 
Data driven innovation in chirurgia: il caso EVARplanning - Paolo Spada
Data driven innovation in chirurgia: il caso EVARplanning - Paolo SpadaData driven innovation in chirurgia: il caso EVARplanning - Paolo Spada
Data driven innovation in chirurgia: il caso EVARplanning - Paolo Spada
 
Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)
Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)
Data Driven UX: Come lo facciamo? C. Frinolli & N. Molchanova (Nois3)
 
Netadminpres
NetadminpresNetadminpres
Netadminpres
 
Security analytics
Security analyticsSecurity analytics
Security analytics
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analytics
 

Similar to Data Analytics for Security Intelligence

Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
Thomvest Ventures
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
Peter Wood
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
Ulf Mattsson
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
Software Guru
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...
International Federation for Information Technologies in Travel and Tourism (IFITT)
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
Cameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
Cameron Forbes Over
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
Peter Wood
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
Ulf Mattsson
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspective
Mateusz Maj
 
Analysis of Big Data
Analysis of Big DataAnalysis of Big Data
Analysis of Big Data
IRJET Journal
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
IBM Security
 
Simon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New RiskSimon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New Risk
Hoi Lan Leong
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
Renub Research
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
Ulf Mattsson
 

Similar to Data Analytics for Security Intelligence (20)

Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspective
 
Analysis of Big Data
Analysis of Big DataAnalysis of Big Data
Analysis of Big Data
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Simon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New RiskSimon Thomas - Big Data: New Opportunity, New Risk
Simon Thomas - Big Data: New Opportunity, New Risk
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 

More from Data Driven Innovation

Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...
Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...
Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...
Data Driven Innovation
 
La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...
La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...
La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...
Data Driven Innovation
 
How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...
How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...
How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...
Data Driven Innovation
 
Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...
Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...
Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...
Data Driven Innovation
 
CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...
CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...
CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...
Data Driven Innovation
 
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Data Driven Innovation
 
Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...
Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...
Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...
Data Driven Innovation
 
Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...
Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...
Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...
Data Driven Innovation
 
I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...
I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...
I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...
Data Driven Innovation
 
Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...
Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...
Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...
Data Driven Innovation
 
Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)
Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)
Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)
Data Driven Innovation
 
WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...
WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...
WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...
Data Driven Innovation
 
CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)
CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)
CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)
Data Driven Innovation
 
Big Data Confederation: toward the local urban data market place (Renzo Taffa...
Big Data Confederation: toward the local urban data market place (Renzo Taffa...Big Data Confederation: toward the local urban data market place (Renzo Taffa...
Big Data Confederation: toward the local urban data market place (Renzo Taffa...
Data Driven Innovation
 
Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...
Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...
Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...
Data Driven Innovation
 
Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...
Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...
Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...
Data Driven Innovation
 
Reusing open data: how to make a difference (Vittorio Scarano, Università di ...
Reusing open data: how to make a difference (Vittorio Scarano, Università di ...Reusing open data: how to make a difference (Vittorio Scarano, Università di ...
Reusing open data: how to make a difference (Vittorio Scarano, Università di ...
Data Driven Innovation
 
Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)
Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)
Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)
Data Driven Innovation
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Driven Innovation
 
Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...
Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...
Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...
Data Driven Innovation
 

More from Data Driven Innovation (20)

Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...
Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...
Integrazione della mobilità elettrica nei sistemi urbani (Stefano Carrese, Un...
 
La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...
La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...
La statistica ufficiale e i trasporti marittimi nell'era dei big data (Vincen...
 
How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...
How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...
How can we realize the Mobility as a Service (Maas) (Andrea Paletti, London S...
 
Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...
Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...
Il DTC-Lazio e i dati del patrimonio culturale (Maria Prezioso, Università To...
 
CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...
CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...
CHNet-DHLab: Servizi Cloud a supporto dei beni culturali (Fabio Proietti, INF...
 
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
 
Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...
Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...
Una infrastruttura per l’accesso al patrimonio culturale: il Progetto del Por...
 
Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...
Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...
Utilizzo dei Big data per l’analisi dei flussi veicolari e della mobilità (Ma...
 
I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...
I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...
I dati personali nell'analisi comportamentale della mobilità di dipendenti e ...
 
Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...
Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...
Estrarre valore dai dati: tecnologie per ottimizzare la mobilità del futuro (...
 
Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)
Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)
Le piattaforme dati per la mobilità nelle città italiane (Marco Mena, EY)
 
WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...
WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...
WiseTown, un ecosistema di applicazioni e strumenti per migliorare la qualità...
 
CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)
CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)
CityOpenSource as a civic tech tool (Ilaria Vitellio, CityOpenSource)
 
Big Data Confederation: toward the local urban data market place (Renzo Taffa...
Big Data Confederation: toward the local urban data market place (Renzo Taffa...Big Data Confederation: toward the local urban data market place (Renzo Taffa...
Big Data Confederation: toward the local urban data market place (Renzo Taffa...
 
Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...
Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...
Making citizens the eyes of policy makers: a sweet spot for hybrid AI? (Danie...
 
Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...
Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...
Dall'Agenda Digitale alla Smart City: il percorso di Roma Capitale verso il D...
 
Reusing open data: how to make a difference (Vittorio Scarano, Università di ...
Reusing open data: how to make a difference (Vittorio Scarano, Università di ...Reusing open data: how to make a difference (Vittorio Scarano, Università di ...
Reusing open data: how to make a difference (Vittorio Scarano, Università di ...
 
Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)
Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)
Gestire i beni culturali con i big data (Sandro Stancampiano, Istat)
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
 
Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...
Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...
Data driven economy: bastano i dati per avviare una start up? (Gabriele Anton...
 

Recently uploaded

一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 

Recently uploaded (20)

一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 

Data Analytics for Security Intelligence

  • 1. Data Analytics for Security Intelligence Camil Demetrescu Dept. Computer, Control, and Management Engineering Credits: Peter Wood, First Base Technologies LLP Data Driven Innovation Rome 2016 – Open Summit Roma Tre University, May 20 2016
  • 2. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 2
  • 3. Big data Every day, we create 2.5 quintillion bytes of data. 90% of the data in the world today has been created in the last two years alone. http://www-01.ibm.c/software/data/bigdata/ 2.5 quintillion = 2.5 exabytes = 2.5 x 1018 = 2.500.000.000.000.000.000 bytes •  Sensors used to gather climate information •  Posts to social media sites •  Digital pictures and videos •  Purchase transaction records •  Cell phone GPS signals 20/5/2016Data Driven Innovation Rome 2016 Page 3
  • 5. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 5
  • 6. Malware events per hour 20/5/2016Data Driven Innovation Rome 2016 Page 6 Organisations on average are experiencing malware-related activities once every three minutes. Receipt of a malicious email, a user clicking a link on an infected website, or an infected machine making a call back to a command and control server. FireEyeAdvancedThreatReport2012
  • 7. How breach occurred 20/5/2016Data Driven Innovation Rome 2016 Page 7 The Post Breach Boom, Ponemon Institute 2015 Survey of 3,529 IT and IT security practitioners
  • 8. When the breach was discovered 20/5/2016Data Driven Innovation Rome 2016 Page 8 The Post Breach Boom, Ponemon Institute 2015 Survey of 3,529 IT and IT security practitioners
  • 9. Reasons for failing to prevent the breach 20/5/2016Data Driven Innovation Rome 2016 Page 9 ThePostBreachBoom,PonemonInstitute2015 Surveyof3,529ITandITsecuritypractitioners
  • 10. Extrapolated cost of breach 20/5/2016Data Driven Innovation Rome 2016 Page 10 ThePostBreachBoom,PonemonInstitute2015 Surveyof3,529ITandITsecuritypractitioners
  • 11. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 11
  • 12. Data driven information security: examples 20/5/2016Data Driven Innovation Rome 2016 Page 12 •  Analyze system/applications log files •  Analyze network traffic •  Identify anomalies and suspicious activities •  Correlate multiple sources of information into a coherent view
  • 13. Why do we need big data systems? 20/5/2016Data Driven Innovation Rome 2016 Page 13 •  System Log files that can grow by gigabytes per second •  Network data captures, which can grow by 10s of gigabytes per second •  Intrusion Detection/Protection log files that can grow by 10s of gigabytes per second •  Application Log files that can grow by gigabytes per second http://www.virtualizationpractice.com/big-data-security-tools-22075/
  • 14. Traditional scenarios Traditional defences: •  Signature-based anti-virus •  Signature-based IDS/IDP •  Firewalls and perimeter devices Traditional approach: •  Data collection for compliance •  Check-list mindset •  Tactical thinking 20/5/2016Data Driven Innovation Rome 2016 Page 14
  • 15. New challenges Complex threat landscape: •  Stealth malware •  Targeted attacks •  Social engineering New technologies and challenges: •  Social networking •  Cloud •  BYOD / consumerisation •  Virtualisation 20/5/2016Data Driven Innovation Rome 2016 Page 15
  • 16. Conventional vs. advanced approaches 20/5/2016Data Driven Innovation Rome 2016 Page 16 http://www.emc.com/collateral/industry-overview/sbic-rpt.pdf
  • 17. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 17
  • 18. Data-driven information security: early times 20/5/2016Data Driven Innovation Rome 2016 Page 18 •  Bank fraud detection and anomaly-based intrusion detection systems. •  Credit card companies have conducted fraud detection for decades. •  Custom-built infrastructure to mine big data for fraud detection was not economical to adapt for other fraud detection uses (healthcare, insurance, etc.) Cloud Security Alliance
  • 19. Data analytics for intrusion detection 20/5/2016Data Driven Innovation Rome 2016 Page 19 Intrusion detection systems – Security architects realized the need for layered security (e.g., reactive security and breach response) because a system with 100% protective security is impossible. 1st generation 2nd generation Security information and event management (SIEM) – aggregate and filter alarms from many sources and present actionable information to security analysts. 3rd generation Big data analytics in security (2nd generation SIEM) – correlating, consolidating, and contextualizing diverse security event information, correlating long- term historical data for forensic purposes
  • 20. How can big data analytics help? •  Advanced persistent threat (APT) detection? •  Integration of IT and physical security? •  Predictive analysis •  Real-time updates •  Behaviour models •  Correlation •  … advising the analysts? •  … active defence? 20/5/2016Data Driven Innovation Rome 2016 Page 20
  • 21. How can big data analytics help? 20/5/2016Data Driven Innovation Rome 2016 Page 21
  • 22. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 22
  • 23. Big data security challenges •  Bigger data = bigger breaches? •  New technology = security later? •  Information classification •  Information ownership (outputs and raw data) •  Big data in cloud + BYOD = more problems? 20/5/2016Data Driven Innovation Rome 2016 Page 23
  • 24. Big data security risks •  New technology will introduce new vulnerabilities •  Attack surface of the nodes in a cluster may not have been reviewed and servers adequately hardened •  User authentication and access to data from multiple locations may not be sufficiently controlled •  Regulatory requirements may not be fulfilled, with access to logs and audit trails problematic •  Significant opportunity for malicious data input and inadequate data validation 20/5/2016Data Driven Innovation Rome 2016 Page 24
  • 25. Big data privacy concerns •  De-identifed information may be re-identified •  Possible deduction of personally identifiable information •  Risk of data breach is increased •  "Creepy" Factor: consumers may feel that companies know more about them than they are willing to volunteer •  Big brother: predictive policing and tracking potential terrorist activities. Harm individual rights or deny consumers important benefits (such as housing or employment) in lieu of credit reports. http://www.ftc.gov/public-statements/2012/03/big-data-big-issues
  • 26. Outline •  Big data •  Advanced threats – current situation •  Why big data for security? •  How can big data help? •  Big data security challenges •  Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 26
  • 27. Conclusions 20/5/2016Data Driven Innovation Rome 2016 Page 27 •  As with all new technologies, security in big data use cases seems to be an afterthought at best •  Big data breaches will be big too, with even more serious reputational damage and legal repercussions •  All organisations need to invest in research and study of the emerging big data security analytics landscape •  Big data has the potential to defend against advanced threats, but requires a big re-think of approach •  Relevant skills are key to successful deployment, only the largest organisations can invest in this now
  • 28. Big data to collect •  Logs •  Network traffic •  IT assets •  Sensitive / valuable information •  Vulnerabilities •  Threat intelligence •  Application behaviour •  User behaviour 20/5/2016Data Driven Innovation Rome 2016 Page 28