SlideShare a Scribd company logo
© 2014 IBM Corporation 
Four key steps to security and privacy for big data
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
2 
Change increases data management challenges 
Consumerization of IT 
Data is… 
Generated 24x7 
Used everywhere 
Always accessible 
On private devices 
Data Explosion 
Data is… 
Leaving the data center 
Stored on shared drives 
Hosted by 3rd parties 
Managed by 3rd parties 
Data is… 
Produced in high volumes 
Stored in diverse formats 
Analyzed faster/cheaper 
Monetized 
Mobile 
New data platforms offer tremendous opportunities for enterprises, but they are also a honey pot for attackers.
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
3 
Threats to data come from a variety of sources 
42% 
external, malicious attacks 
30% 
human errors 
29% 
system/IT glitches 
Where do data breaches originate? 
Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute LLC, May 2014
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
4 
Data breaches have a significant financial impact 
of companies said a 
data breach caused moderate 
to severe impact on the 
business 
2/3 of customers would 
leave you if you mistreated 
their data 
average cost 
of a data breach 
$184M - $330M brand value lost by each victim of a data breach 
2/3 76% $3.5M 
Source: Reputation Impact of a Data Breach, Ponemon Institute LLC, Oct 2011
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
5 
Data security is becoming a greater executive concern 
Increasingly, companies are appointing CISOs, CROs and CDOs* with direct lines to the Audit Committee 
Loss of market share and reputation 
Legal exposure 
Audit failure 
Fines and criminal charges 
Financial loss 
Loss of data confidentiality, integrity and/or availability 
Violation of employee privacy 
Loss of customer trust 
Loss of brand reputation 
CEO 
CFO/COO 
CIO 
CHRO 
CMO 
*Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series 
* Chief Information Security Officer 
Chief Risk Officer 
Chief Data Officer 
C-level officers have varied concerns about data security and privacy.
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
6 
To protect data, address these key questions 
Where is the sensitive data? 
How can sensitive data be protected? 
What is actually happening? 
How can we prevent unauthorized activities be prevented? 
Discovery 
Classification 
Identity & Access Management 
Activity 
Monitoring 
Blocking 
Quarantine 
Masking/ Encryption 
Assessment 
Compliance Reporting & Security Alerts 
Data Protection & Enforcement 
Security Policies 
Access Entitlements 
1. Discover 
2. Harden 
3. Monitor 
4. Protect
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
7 
Build a holistic data security and privacy strategy 
Big data and traditional environments 
Data at Rest 
Configuration 
Data in Motion 
Discovery 
Classification 
Masking 
Encryption 
Vulnerability Assessment 
Entitlements Reporting 
Activity 
Monitoring 
Dynamic Data Masking 
1. Discover 
2. Harden 
3. Monitor 
4. Protect 
Blocking 
Quarantine 
A holistic data security and privacy strategy will: a. prevent data breaches b. ensure data integrity c. reduce cost of compliance d. protect privacy
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
8 
Four steps to holistic data security and privacy 
Find & 
Classify 
Secure & 
Monitor 
Harden 
Protect & 
Remain Vigilant 
 Continuously assess 
database 
vulnerabilities 
 Monitor authorized 
access entitlements 
 Centralize reporting 
 Define sensitive 
data 
 Discover and 
classify sensitive 
data 
 Collaborate 
between business 
& IT 
 Real-time alerts on 
configuration changes 
 Preconfigured policies 
and reports 
 Built-in compliance 
workflow 
 Automated security 
policies 
 Enforce change 
control 
 Mask sensitive data 
 Prevent cyber 
attacks 
 Encrypt data at rest 
Best practices based approach aligns people, processes and technology to 
create a cohesive, coordinated approach to data security 
1 
2 
3 
4
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
9 
Explore further 
Four steps to a 
proactive big data 
security and privacy 
strategy 
Comprehensive data 
protection for 
physical, virtual and 
cloud 
infrastructures 
Download these 
free eBooks and 
get started with 
your data security 
and privacy journey
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
10 
ACT 
with Confidence

More Related Content

What's hot

Reasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computingReasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computing
Lily Smith
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
Eryk Budi Pratama
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
Neil Kemp
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
CUNIX INDIA
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
Blancco
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
yuliana_mar
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
PECB
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
Amy Daly
 
Information security.pptx
Information security.pptxInformation security.pptx
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
Anne Starr
 
Whitepaper: Security in the Network Environment
Whitepaper: Security in the Network EnvironmentWhitepaper: Security in the Network Environment
Whitepaper: Security in the Network Environment
EES Africa (Pty) Ltd
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
siddarthc
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
Anne Starr
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
himalya sharma
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
ethanBrownusa
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
Tony Richardson CISSP
 

What's hot (20)

Reasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computingReasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computing
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Information security
Information securityInformation security
Information security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
Whitepaper: Security in the Network Environment
Whitepaper: Security in the Network EnvironmentWhitepaper: Security in the Network Environment
Whitepaper: Security in the Network Environment
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 

Viewers also liked

Brainient deck for institute marketing
Brainient deck for institute marketingBrainient deck for institute marketing
Brainient deck for institute marketing
LiveStation
 
Building a Distributed Build System at Google Scale
Building a Distributed Build System at Google ScaleBuilding a Distributed Build System at Google Scale
Building a Distributed Build System at Google Scale
Aysylu Greenberg
 
Webinar: Customer Growth and Loyalty with the Marketing Cloud
Webinar: Customer Growth and Loyalty with the Marketing CloudWebinar: Customer Growth and Loyalty with the Marketing Cloud
Webinar: Customer Growth and Loyalty with the Marketing Cloud
Doble Group, LLC
 
Benefits of Modular Gasification (Waste to Energy)
Benefits of Modular Gasification (Waste to Energy)Benefits of Modular Gasification (Waste to Energy)
Benefits of Modular Gasification (Waste to Energy)
Erik Lindquist, P.Eng.
 
Brainient interactive video
Brainient interactive videoBrainient interactive video
Brainient interactive video
Elena Iordache Stoica
 
The Big Data Ecosystem for Financial Services
The Big Data Ecosystem for Financial ServicesThe Big Data Ecosystem for Financial Services
The Big Data Ecosystem for Financial Services
DataStax
 
Technology, creativity & data: How to tell your story, engage your audience a...
Technology, creativity & data: How to tell your story, engage your audience a...Technology, creativity & data: How to tell your story, engage your audience a...
Technology, creativity & data: How to tell your story, engage your audience a...
Rapt Media
 
6 Presentation Styles of Famous Presenters
6 Presentation Styles of Famous Presenters6 Presentation Styles of Famous Presenters
6 Presentation Styles of Famous Presenters
24Slides
 
Types of presentations
Types of presentationsTypes of presentations
Types of presentations
Jim Aspinall
 

Viewers also liked (9)

Brainient deck for institute marketing
Brainient deck for institute marketingBrainient deck for institute marketing
Brainient deck for institute marketing
 
Building a Distributed Build System at Google Scale
Building a Distributed Build System at Google ScaleBuilding a Distributed Build System at Google Scale
Building a Distributed Build System at Google Scale
 
Webinar: Customer Growth and Loyalty with the Marketing Cloud
Webinar: Customer Growth and Loyalty with the Marketing CloudWebinar: Customer Growth and Loyalty with the Marketing Cloud
Webinar: Customer Growth and Loyalty with the Marketing Cloud
 
Benefits of Modular Gasification (Waste to Energy)
Benefits of Modular Gasification (Waste to Energy)Benefits of Modular Gasification (Waste to Energy)
Benefits of Modular Gasification (Waste to Energy)
 
Brainient interactive video
Brainient interactive videoBrainient interactive video
Brainient interactive video
 
The Big Data Ecosystem for Financial Services
The Big Data Ecosystem for Financial ServicesThe Big Data Ecosystem for Financial Services
The Big Data Ecosystem for Financial Services
 
Technology, creativity & data: How to tell your story, engage your audience a...
Technology, creativity & data: How to tell your story, engage your audience a...Technology, creativity & data: How to tell your story, engage your audience a...
Technology, creativity & data: How to tell your story, engage your audience a...
 
6 Presentation Styles of Famous Presenters
6 Presentation Styles of Famous Presenters6 Presentation Styles of Famous Presenters
6 Presentation Styles of Famous Presenters
 
Types of presentations
Types of presentationsTypes of presentations
Types of presentations
 

Similar to Big data contains valuable information - Protect It!

Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
IBM Sverige
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
xband
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
John Palfreyman
 
Security in it
Security in it Security in it
Security in it
Yoshan madhumal
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian
 
Information security
Information securityInformation security
Information security
AlaaMahmoud108
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
musicalworld14
 
Ensuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdfEnsuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdf
vincular1
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
IBM Sverige
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
Hortonworks
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
Robert 'Bob' Reyes
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
BVU
 

Similar to Big data contains valuable information - Protect It! (20)

Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
 
Security in it
Security in it Security in it
Security in it
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Information security
Information securityInformation security
Information security
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Ensuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdfEnsuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdf
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Big data contains valuable information - Protect It!

  • 1. © 2014 IBM Corporation Four key steps to security and privacy for big data
  • 2. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 2 Change increases data management challenges Consumerization of IT Data is… Generated 24x7 Used everywhere Always accessible On private devices Data Explosion Data is… Leaving the data center Stored on shared drives Hosted by 3rd parties Managed by 3rd parties Data is… Produced in high volumes Stored in diverse formats Analyzed faster/cheaper Monetized Mobile New data platforms offer tremendous opportunities for enterprises, but they are also a honey pot for attackers.
  • 3. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 3 Threats to data come from a variety of sources 42% external, malicious attacks 30% human errors 29% system/IT glitches Where do data breaches originate? Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute LLC, May 2014
  • 4. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 4 Data breaches have a significant financial impact of companies said a data breach caused moderate to severe impact on the business 2/3 of customers would leave you if you mistreated their data average cost of a data breach $184M - $330M brand value lost by each victim of a data breach 2/3 76% $3.5M Source: Reputation Impact of a Data Breach, Ponemon Institute LLC, Oct 2011
  • 5. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 5 Data security is becoming a greater executive concern Increasingly, companies are appointing CISOs, CROs and CDOs* with direct lines to the Audit Committee Loss of market share and reputation Legal exposure Audit failure Fines and criminal charges Financial loss Loss of data confidentiality, integrity and/or availability Violation of employee privacy Loss of customer trust Loss of brand reputation CEO CFO/COO CIO CHRO CMO *Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series * Chief Information Security Officer Chief Risk Officer Chief Data Officer C-level officers have varied concerns about data security and privacy.
  • 6. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 6 To protect data, address these key questions Where is the sensitive data? How can sensitive data be protected? What is actually happening? How can we prevent unauthorized activities be prevented? Discovery Classification Identity & Access Management Activity Monitoring Blocking Quarantine Masking/ Encryption Assessment Compliance Reporting & Security Alerts Data Protection & Enforcement Security Policies Access Entitlements 1. Discover 2. Harden 3. Monitor 4. Protect
  • 7. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 7 Build a holistic data security and privacy strategy Big data and traditional environments Data at Rest Configuration Data in Motion Discovery Classification Masking Encryption Vulnerability Assessment Entitlements Reporting Activity Monitoring Dynamic Data Masking 1. Discover 2. Harden 3. Monitor 4. Protect Blocking Quarantine A holistic data security and privacy strategy will: a. prevent data breaches b. ensure data integrity c. reduce cost of compliance d. protect privacy
  • 8. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 8 Four steps to holistic data security and privacy Find & Classify Secure & Monitor Harden Protect & Remain Vigilant  Continuously assess database vulnerabilities  Monitor authorized access entitlements  Centralize reporting  Define sensitive data  Discover and classify sensitive data  Collaborate between business & IT  Real-time alerts on configuration changes  Preconfigured policies and reports  Built-in compliance workflow  Automated security policies  Enforce change control  Mask sensitive data  Prevent cyber attacks  Encrypt data at rest Best practices based approach aligns people, processes and technology to create a cohesive, coordinated approach to data security 1 2 3 4
  • 9. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 9 Explore further Four steps to a proactive big data security and privacy strategy Comprehensive data protection for physical, virtual and cloud infrastructures Download these free eBooks and get started with your data security and privacy journey
  • 10. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 10 ACT with Confidence