SlideShare a Scribd company logo
© 2014 IBM Corporation 
October 2014 
Big Data – Big Risk 
How do you protect your sensitive data? 
David Valovcin 
dvalovcin@us.ibm.com
A New Era of Smart 
The Big Data opportunity comes with big security risks 
What is big data? 
Requirement: 
 All kinds of data 
 Large volumes 
 Valuable insight, but difficult to extract 
 Often extremely time sensitive 
Extracting insight from an immense volume, variety and 
velocity of data, in a timely and cost-effective manner. 
• What kind of information is stored in big data? 
• Who’s watching big data access? 
• How do you ensure compliance? 
• Security is the key to enabling enterprise rollouts of big data 
• If it’s not secure, it can be breached. 
2 © 2014 IBM Corporation
A New Era of Smart 
Data breaches are in the news every week 
A “Fear Factor” is causing some orgs to hold back on new mobile, cloud, and big data initiatives 
Data-breach costs take 
toll on Target profit 
… its profit in the fourth quarter fell 46 
percent on a revenue decline of 5.3 
percent as the breach scared off 
customers worried about 
the security of their private 
data. 
Canadian Breach: 
Sorting Out the 
Cause 
Gaps in carrying out 
security policies led 
Account 
to the exposure of 
Takeover: 
583,000 records 
Bank Faces 
last year at 
Two Suits 
Employment and 
Social Development 
totaling $1.5 million 
Canada, Health Breach Tally: 
30 Million Victims 
More than 30.6 million 
individuals have been affected 
by major healthcare data breaches 
since September 2009 
in allegedly 
fraudulent wires 
3 © 2014 IBM Corporation
A New Era of Smart 
Risks are increasing . . . 
4 © 2014 IBM Corporation
A New Era of Smart 
5 © 2014 IBM Corporation
A New Era of Smart 
6 © 2014 IBM Corporation
A New Era of Smart 
Time span of events by percent of breaches 
http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z038 
7 © 2014 IBM Corporation 
7 
Minutes to compromise, months to discover & remediate 
Time span of events by percent of breaches
A New Era of Smart 
Compliance – many regulations both internal & external 
8 
© 2014 IBM Corporation 
8
A New Era of Smart 
Key drivers for data security can be compliance 
HIPAA 
Health Insurance Portability and Accountability Act. 
The Privacy Rule and Security Rule specifies 
protections of sensitive patient information. 
PCI-DSS 
Payment Care Industry Data Security Standard. 
Technical and operational requirements to protect 
cardholder data. 
SOX 
Sarbanes-Oxley Act. Response to financial 
fraud, most concerned with financial data 
integrity and transparency. 
9 
© 2014 IBM Corporation
A New Era of Smart 
10 © 2014 IBM Corporation
A New Era of Smart 
Key questions to ask . . . 
Discovery 
Classification 
Dormant Data 
Security 
Policies 
Dormant 
Entitlements 
Discover Harden Assess Monitor Report 
Where is the 
sensitive data? 
Alerting 
Outliers 
How to prevent 
unauthorized 
activities? 
Identity & Access 
Masking/ 
Assessment Encryption 
How to protect 
sensitive data 
to reduce risk? 
How to secure 
the repository? 
Management 
Activity 
Monitoring 
Who should 
have access? 
What is actually 
happening? 
Compliance Reporting 
& 
Security Alerts 
Data Protection 
& 
Enforcement 
11 © 2014 IBM Corporation
A New Era of Smart 
Security and compliance concerns in Big Data environments 
Structured 
Unstructured 
Streaming 
Big Data Platform 
• Who is running big data requests? 
• What is being accessed? 
• Is there an exceptional number of file 
permission exceptions? 
• Are these jobs part of an authorized 
program list accessing the data? 
• Has some new query application 
been developed that you were 
previously unaware existed (extracting 
sensitive data)? 
Hadoop Cluster 
Clients 
12 © 2014 IBM Corporation
A New Era of Smart 
InfoSphere Data Privacy for Hadoop 
Define and share big data project blueprints, data definitions 
Discover and classify sensitive big data 
Mask and redact sensitive data within and for Hadoop systems 
Monitor Hadoop Data Activity 
Big Data Repositories Analytics 
Information 
Ingestion 
and 
Integration 
Real-time 
Analytics 
Data 
Exploration 
Archive 
Data 
Exploration 
Enterprise 
Warehouse 
Data Marts 
Information Governance, Security and Business 
Continuity 
Sources 
Structured 
Unstructured 
Streaming 
Cognitive 
Learn Dynamically? 
Prescriptive 
Best Outcomes? 
Predictive 
What Could Happen? 
Descriptive 
What Has Happened? 
Exploration and 
Discovery 
What Do You Have? 
InfoSphere 
BigInsights 
13 © 2014 IBM Corporation
A New Era of Smart 
Real-time data activity monitoring for security & compliance 
 Continuous, policy-based, real-time 
monitoring of all data traffic activities 
 Database infrastructure scanning for 
vulnerabilities and mis-configured privileges 
 Data protection compliance automation 
Data nodes 
(databases, warehouses, file 
shares, Big Data) 
Host-based 
probes (S-TAPs) 
Key Characteristics 
 Non-invasive/disruptive, cross-platform architecture 
 Minimal performance impact 
 Prepackaged vulnerability knowledge base and compliance reports 
 Detect or block unauthorized & suspicious activity 
 Granular, real-time policies – who, what when & how 
 Dynamically scalable 
 100% visibility into data transactions 
Collector 
Appliance 
14 © 2014 IBM Corporation
A New Era of Smart 
Extend real-time data activity monitoring across Big Data environments 
InfoSphere 
BigInsights 
DATABASES 
D ATAB AS E Exadata 
FTP 
HANA 
Optim 
Archival 
Siebel, 
PeopleSoft, 
E-Business 
Master Data 
Management 
Data 
Stage 
CICS 
InfoSphere Guardium 
15 © 2014 IBM Corporation
A New Era of Smart 
IBM InfoSphere Guardium 
Open  
Task Launcher View 
Find, view, and filter information about monitored objects, systems, and users. Learn More 
  Audit Trail Summary  HR/PROD/Europe  View  More  
 Filters 
 Tasks 
Apply 
Where 
Group: HR/Prod/Europe  
Server: 15  
Database: 189  
Object: Select object  
Outliers tab shows the 
summary over time 
What 
Policy: PCI  
Rule: Select rule  
Error: Select type  
SQL: Select type  
Who 
User ID: Select user id  
Group: Select group  
Role: Select role  
Grantor: Select grantor  
When 
History: 3 Hours  
Start: Select date / time  
End: Select date / time  
Summary Details Outliers Errors Alerts Violations Report 
16 
© 2014 IBM Corporation
A New Era of Smart 
Report: Identify unauthorized jobs 
Unauthorized 
program! 
Predefined and 
customizable reports 
17 
© 2014 IBM Corporation
A New Era of Smart 
Guardium integrates with IT Infrastructure for seamless operations 
Directory Services 
(Active Directory, LDAP, TDS, etc) 
SIEM 
(IBM QRadar, Arcsight, RSA 
Envision, etc) SNMP Dashboards 
(Tivoli Netcool, HP Openview, etc) 
Change Ticketing 
Systems 
(Tivoli Request Mgr, Remedy, 
Peregrine, etc) 
Vulnerability 
Standards 
(CVE, STIG, CIS Benchmark, 
SCAP) 
Authentication 
(RSA SecurID, Radius, Kerberos, 
LDAP) 
Data Classification 
and Leak Protection 
(Credit Card, Social Security, phone, 
custom, etc) 
Security Management 
Platforms 
(IBM QRadar, McAfee ePO ) 
Application Servers 
(IBM Websphere, IBM Cognos, Oracle 
EBS, SAP, Siebel, Peoplesoft, etc ) 
Web Application 
Firewalls 
(F5 ASM) 
Long Term Storage 
(IBM TSM, IBM Nettezza, EMC Centera, 
FTP, SCP, Optim Archive etc) 
Send Alerts 
(CEF, CSV, 
Syslog, etc) Send 
Events 
• STAP 
Software Deployment 
(IBM Tivoli Provisioning Manager, RPM, 
Native Distributions) 
18 © 2014 IBM Corporation
A New Era of Smart 
19 
19 © 2014 IBM Corporation
A New Era of Smart 
Learn more about protecting Big Data and removing risk 
Schedule a Client Value Engagement (CVE) at no cost to you 
• Business and IT: Narrow the communication gap 
• Easy to follow programmatic client-centric approach – determine possible benefits 
from solution 
• Fast time to completion: Less than a weeks– deliverables easy to follow and 
understand 
Visit a lab for a deeper dive with our Product Managers and R&D teams 
• In-depth technical discussions & product demonstrations 
• Product roadmap discussions; get the latest on innovations and research 
• Collaborate with our best experts on your problems and potential solutions 
Visit the web for more about InfoSphere solutions 
• Understanding and selecting data masking solutions 
• Understanding encryption requirements of PCI DSS 
• Managing compliance to protect enterprise data 
• Top tips for security big data environments 
• Three guiding principals to improve data security 
You Tube: InfoSphere Guardium 
@IBM_Guardium 
20 © 2014 IBM Corporation
© 2014 IBM Corporation 
Thank You 
David Valovcin 
dvalovcin@us.ibm.com

More Related Content

What's hot

Overview - IBM Big Data Platform
Overview - IBM Big Data PlatformOverview - IBM Big Data Platform
Overview - IBM Big Data Platform
Vikas Manoria
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
Cloudera, Inc.
 
Keynote: The Journey to Pervasive Analytics
Keynote: The Journey to Pervasive AnalyticsKeynote: The Journey to Pervasive Analytics
Keynote: The Journey to Pervasive Analytics
Cloudera, Inc.
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
Cloudera, Inc.
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18
Cloudera, Inc.
 
Seagate: Sensor Overload! Taming The Raging Manufacturing Big Data Torrent
Seagate: Sensor Overload! Taming The Raging Manufacturing Big Data TorrentSeagate: Sensor Overload! Taming The Raging Manufacturing Big Data Torrent
Seagate: Sensor Overload! Taming The Raging Manufacturing Big Data Torrent
Seeling Cheung
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
Tony Pearson
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and Manufacturing
Cloudera, Inc.
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
Scott Clinton
 
How to create a successful data archiving strategy for your Salesforce Org.
How to create a successful data archiving strategy for your Salesforce Org.How to create a successful data archiving strategy for your Salesforce Org.
How to create a successful data archiving strategy for your Salesforce Org.
DataArchiva
 
GE’s Industrial Data Lake Platform
GE’s Industrial Data Lake PlatformGE’s Industrial Data Lake Platform
GE’s Industrial Data Lake Platform
International Society of Service Innovation Professionals
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
Caserta
 
Open Source in the Energy Industry - Creating a New Operational Model for Dat...
Open Source in the Energy Industry - Creating a New Operational Model for Dat...Open Source in the Energy Industry - Creating a New Operational Model for Dat...
Open Source in the Energy Industry - Creating a New Operational Model for Dat...
DataWorks Summit
 
The 5 Keys to a Killer Data Lake
The 5 Keys to a Killer Data LakeThe 5 Keys to a Killer Data Lake
The 5 Keys to a Killer Data Lake
DataWorks Summit
 
Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18
Cloudera, Inc.
 
Big Data Solutions Executive Overview
Big Data Solutions Executive OverviewBig Data Solutions Executive Overview
Big Data Solutions Executive Overview
RCG Global Services
 
IBM Industry Models and Data Lake
IBM Industry Models and Data Lake IBM Industry Models and Data Lake
IBM Industry Models and Data Lake
Pat O'Sullivan
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data Architecture
Zaloni
 
Making Big Data Analytics with Hadoop fast & easy (webinar slides)
Making Big Data Analytics with Hadoop fast & easy (webinar slides)Making Big Data Analytics with Hadoop fast & easy (webinar slides)
Making Big Data Analytics with Hadoop fast & easy (webinar slides)
Yellowfin
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
DataWorks Summit
 

What's hot (20)

Overview - IBM Big Data Platform
Overview - IBM Big Data PlatformOverview - IBM Big Data Platform
Overview - IBM Big Data Platform
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Keynote: The Journey to Pervasive Analytics
Keynote: The Journey to Pervasive AnalyticsKeynote: The Journey to Pervasive Analytics
Keynote: The Journey to Pervasive Analytics
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18How Cloudera SDX can aid GDPR compliance 6.21.18
How Cloudera SDX can aid GDPR compliance 6.21.18
 
Seagate: Sensor Overload! Taming The Raging Manufacturing Big Data Torrent
Seagate: Sensor Overload! Taming The Raging Manufacturing Big Data TorrentSeagate: Sensor Overload! Taming The Raging Manufacturing Big Data Torrent
Seagate: Sensor Overload! Taming The Raging Manufacturing Big Data Torrent
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and Manufacturing
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
 
How to create a successful data archiving strategy for your Salesforce Org.
How to create a successful data archiving strategy for your Salesforce Org.How to create a successful data archiving strategy for your Salesforce Org.
How to create a successful data archiving strategy for your Salesforce Org.
 
GE’s Industrial Data Lake Platform
GE’s Industrial Data Lake PlatformGE’s Industrial Data Lake Platform
GE’s Industrial Data Lake Platform
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
 
Open Source in the Energy Industry - Creating a New Operational Model for Dat...
Open Source in the Energy Industry - Creating a New Operational Model for Dat...Open Source in the Energy Industry - Creating a New Operational Model for Dat...
Open Source in the Energy Industry - Creating a New Operational Model for Dat...
 
The 5 Keys to a Killer Data Lake
The 5 Keys to a Killer Data LakeThe 5 Keys to a Killer Data Lake
The 5 Keys to a Killer Data Lake
 
Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18
 
Big Data Solutions Executive Overview
Big Data Solutions Executive OverviewBig Data Solutions Executive Overview
Big Data Solutions Executive Overview
 
IBM Industry Models and Data Lake
IBM Industry Models and Data Lake IBM Industry Models and Data Lake
IBM Industry Models and Data Lake
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data Architecture
 
Making Big Data Analytics with Hadoop fast & easy (webinar slides)
Making Big Data Analytics with Hadoop fast & easy (webinar slides)Making Big Data Analytics with Hadoop fast & easy (webinar slides)
Making Big Data Analytics with Hadoop fast & easy (webinar slides)
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
 

Viewers also liked

E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...InSync2011
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
IBM Sverige
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
Pa Al
 
Graphics for big data reference architecture blog
Graphics for big data reference architecture blogGraphics for big data reference architecture blog
Graphics for big data reference architecture blogSunil Soares
 
Delivering Apache Hadoop for the Modern Data Architecture
Delivering Apache Hadoop for the Modern Data Architecture Delivering Apache Hadoop for the Modern Data Architecture
Delivering Apache Hadoop for the Modern Data Architecture
Hortonworks
 
Data analysis using spss
Data analysis using spssData analysis using spss
Data analysis using spss
Muhammad Ibrahim
 

Viewers also liked (6)

E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
 
Graphics for big data reference architecture blog
Graphics for big data reference architecture blogGraphics for big data reference architecture blog
Graphics for big data reference architecture blog
 
Delivering Apache Hadoop for the Modern Data Architecture
Delivering Apache Hadoop for the Modern Data Architecture Delivering Apache Hadoop for the Modern Data Architecture
Delivering Apache Hadoop for the Modern Data Architecture
 
Data analysis using spss
Data analysis using spssData analysis using spss
Data analysis using spss
 

Similar to David valovcin big data - big risk

Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
John Palfreyman
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Ibm big data-platform
Ibm big data-platformIbm big data-platform
Ibm big data-platform
IBM Sverige
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
Nicolas Morales
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
Robert Lecklin - BigData is making a difference
Robert Lecklin - BigData is making a differenceRobert Lecklin - BigData is making a difference
Robert Lecklin - BigData is making a difference
IBM Sverige
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
xband
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
John Palfreyman
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
IBM Analytics
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
IBM Security
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
Cloudera, Inc.
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
Hortonworks
 

Similar to David valovcin big data - big risk (20)

Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Ibm big data-platform
Ibm big data-platformIbm big data-platform
Ibm big data-platform
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Robert Lecklin - BigData is making a difference
Robert Lecklin - BigData is making a differenceRobert Lecklin - BigData is making a difference
Robert Lecklin - BigData is making a difference
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 

More from IBM Sverige

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
IBM Sverige
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
IBM Sverige
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

IBM Sverige
 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
IBM Sverige
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
IBM Sverige
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
IBM Sverige
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
IBM Sverige
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
IBM Sverige
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
IBM Sverige
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
IBM Sverige
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
IBM Sverige
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
IBM Sverige
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
IBM Sverige
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
IBM Sverige
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
IBM Sverige
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
IBM Sverige
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
IBM Sverige
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
IBM Sverige
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
IBM Sverige
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
IBM Sverige
 

More from IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Recently uploaded

一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
StarCompliance.io
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 

Recently uploaded (20)

一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 

David valovcin big data - big risk

  • 1. © 2014 IBM Corporation October 2014 Big Data – Big Risk How do you protect your sensitive data? David Valovcin dvalovcin@us.ibm.com
  • 2. A New Era of Smart The Big Data opportunity comes with big security risks What is big data? Requirement:  All kinds of data  Large volumes  Valuable insight, but difficult to extract  Often extremely time sensitive Extracting insight from an immense volume, variety and velocity of data, in a timely and cost-effective manner. • What kind of information is stored in big data? • Who’s watching big data access? • How do you ensure compliance? • Security is the key to enabling enterprise rollouts of big data • If it’s not secure, it can be breached. 2 © 2014 IBM Corporation
  • 3. A New Era of Smart Data breaches are in the news every week A “Fear Factor” is causing some orgs to hold back on new mobile, cloud, and big data initiatives Data-breach costs take toll on Target profit … its profit in the fourth quarter fell 46 percent on a revenue decline of 5.3 percent as the breach scared off customers worried about the security of their private data. Canadian Breach: Sorting Out the Cause Gaps in carrying out security policies led Account to the exposure of Takeover: 583,000 records Bank Faces last year at Two Suits Employment and Social Development totaling $1.5 million Canada, Health Breach Tally: 30 Million Victims More than 30.6 million individuals have been affected by major healthcare data breaches since September 2009 in allegedly fraudulent wires 3 © 2014 IBM Corporation
  • 4. A New Era of Smart Risks are increasing . . . 4 © 2014 IBM Corporation
  • 5. A New Era of Smart 5 © 2014 IBM Corporation
  • 6. A New Era of Smart 6 © 2014 IBM Corporation
  • 7. A New Era of Smart Time span of events by percent of breaches http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z038 7 © 2014 IBM Corporation 7 Minutes to compromise, months to discover & remediate Time span of events by percent of breaches
  • 8. A New Era of Smart Compliance – many regulations both internal & external 8 © 2014 IBM Corporation 8
  • 9. A New Era of Smart Key drivers for data security can be compliance HIPAA Health Insurance Portability and Accountability Act. The Privacy Rule and Security Rule specifies protections of sensitive patient information. PCI-DSS Payment Care Industry Data Security Standard. Technical and operational requirements to protect cardholder data. SOX Sarbanes-Oxley Act. Response to financial fraud, most concerned with financial data integrity and transparency. 9 © 2014 IBM Corporation
  • 10. A New Era of Smart 10 © 2014 IBM Corporation
  • 11. A New Era of Smart Key questions to ask . . . Discovery Classification Dormant Data Security Policies Dormant Entitlements Discover Harden Assess Monitor Report Where is the sensitive data? Alerting Outliers How to prevent unauthorized activities? Identity & Access Masking/ Assessment Encryption How to protect sensitive data to reduce risk? How to secure the repository? Management Activity Monitoring Who should have access? What is actually happening? Compliance Reporting & Security Alerts Data Protection & Enforcement 11 © 2014 IBM Corporation
  • 12. A New Era of Smart Security and compliance concerns in Big Data environments Structured Unstructured Streaming Big Data Platform • Who is running big data requests? • What is being accessed? • Is there an exceptional number of file permission exceptions? • Are these jobs part of an authorized program list accessing the data? • Has some new query application been developed that you were previously unaware existed (extracting sensitive data)? Hadoop Cluster Clients 12 © 2014 IBM Corporation
  • 13. A New Era of Smart InfoSphere Data Privacy for Hadoop Define and share big data project blueprints, data definitions Discover and classify sensitive big data Mask and redact sensitive data within and for Hadoop systems Monitor Hadoop Data Activity Big Data Repositories Analytics Information Ingestion and Integration Real-time Analytics Data Exploration Archive Data Exploration Enterprise Warehouse Data Marts Information Governance, Security and Business Continuity Sources Structured Unstructured Streaming Cognitive Learn Dynamically? Prescriptive Best Outcomes? Predictive What Could Happen? Descriptive What Has Happened? Exploration and Discovery What Do You Have? InfoSphere BigInsights 13 © 2014 IBM Corporation
  • 14. A New Era of Smart Real-time data activity monitoring for security & compliance  Continuous, policy-based, real-time monitoring of all data traffic activities  Database infrastructure scanning for vulnerabilities and mis-configured privileges  Data protection compliance automation Data nodes (databases, warehouses, file shares, Big Data) Host-based probes (S-TAPs) Key Characteristics  Non-invasive/disruptive, cross-platform architecture  Minimal performance impact  Prepackaged vulnerability knowledge base and compliance reports  Detect or block unauthorized & suspicious activity  Granular, real-time policies – who, what when & how  Dynamically scalable  100% visibility into data transactions Collector Appliance 14 © 2014 IBM Corporation
  • 15. A New Era of Smart Extend real-time data activity monitoring across Big Data environments InfoSphere BigInsights DATABASES D ATAB AS E Exadata FTP HANA Optim Archival Siebel, PeopleSoft, E-Business Master Data Management Data Stage CICS InfoSphere Guardium 15 © 2014 IBM Corporation
  • 16. A New Era of Smart IBM InfoSphere Guardium Open  Task Launcher View Find, view, and filter information about monitored objects, systems, and users. Learn More   Audit Trail Summary  HR/PROD/Europe  View  More   Filters  Tasks Apply Where Group: HR/Prod/Europe  Server: 15  Database: 189  Object: Select object  Outliers tab shows the summary over time What Policy: PCI  Rule: Select rule  Error: Select type  SQL: Select type  Who User ID: Select user id  Group: Select group  Role: Select role  Grantor: Select grantor  When History: 3 Hours  Start: Select date / time  End: Select date / time  Summary Details Outliers Errors Alerts Violations Report 16 © 2014 IBM Corporation
  • 17. A New Era of Smart Report: Identify unauthorized jobs Unauthorized program! Predefined and customizable reports 17 © 2014 IBM Corporation
  • 18. A New Era of Smart Guardium integrates with IT Infrastructure for seamless operations Directory Services (Active Directory, LDAP, TDS, etc) SIEM (IBM QRadar, Arcsight, RSA Envision, etc) SNMP Dashboards (Tivoli Netcool, HP Openview, etc) Change Ticketing Systems (Tivoli Request Mgr, Remedy, Peregrine, etc) Vulnerability Standards (CVE, STIG, CIS Benchmark, SCAP) Authentication (RSA SecurID, Radius, Kerberos, LDAP) Data Classification and Leak Protection (Credit Card, Social Security, phone, custom, etc) Security Management Platforms (IBM QRadar, McAfee ePO ) Application Servers (IBM Websphere, IBM Cognos, Oracle EBS, SAP, Siebel, Peoplesoft, etc ) Web Application Firewalls (F5 ASM) Long Term Storage (IBM TSM, IBM Nettezza, EMC Centera, FTP, SCP, Optim Archive etc) Send Alerts (CEF, CSV, Syslog, etc) Send Events • STAP Software Deployment (IBM Tivoli Provisioning Manager, RPM, Native Distributions) 18 © 2014 IBM Corporation
  • 19. A New Era of Smart 19 19 © 2014 IBM Corporation
  • 20. A New Era of Smart Learn more about protecting Big Data and removing risk Schedule a Client Value Engagement (CVE) at no cost to you • Business and IT: Narrow the communication gap • Easy to follow programmatic client-centric approach – determine possible benefits from solution • Fast time to completion: Less than a weeks– deliverables easy to follow and understand Visit a lab for a deeper dive with our Product Managers and R&D teams • In-depth technical discussions & product demonstrations • Product roadmap discussions; get the latest on innovations and research • Collaborate with our best experts on your problems and potential solutions Visit the web for more about InfoSphere solutions • Understanding and selecting data masking solutions • Understanding encryption requirements of PCI DSS • Managing compliance to protect enterprise data • Top tips for security big data environments • Three guiding principals to improve data security You Tube: InfoSphere Guardium @IBM_Guardium 20 © 2014 IBM Corporation
  • 21. © 2014 IBM Corporation Thank You David Valovcin dvalovcin@us.ibm.com