SlideShare a Scribd company logo
GETTTING REAL ABOUT SECURITY
MANAGEMENT AND "BIG DATA"
A Roadmap for "Big Data" in Security Analytics
                                          It’s an exciting yet daunting time to be a security professional. Security threats are
ESSENTIALS                                becoming more aggressive and voracious. Governments and industry bodies are
This paper examines:                      getting more prescriptive around compliance. Combined with exponentially more
                                          complex IT environments, security management is increasingly challenging. Moreover,
 •   Escalating complexity of the
                                          new “Big Data” technologies purport bringing advanced analytic techniques like
     security management
                                          predictive analysis and advanced statistical techniques close to the security
     environment, from threats to IT
                                          professional.
     environments to compliance
     mandates                             Given the state of today’s security systems, most organizations are a long way from
                                          using these types of advanced technologies for security management. Security
 •   How to get more meaning from
                                          professionals need to get more value from the data already collected and analyzed.
     data already collected, by
                                          They also need a better understanding of both current issues and impending
     “eliminating the hay from the
                                          challenges related to data. Starting with a foundational set of data management and
     haystack” rather than “looking for
                                          analytic capabilities enables organizations to effectively build and scale security
     the needles”
                                          management as the enterprise evolves to meet Big Data challenges.
 •   The combination of infrastructure,
     analytic tools, and threat           TODAY'S SECURITY LANDSCAPE LEAVES NO
     intelligence needed to drive
     business value from Big Data
                                          ROOM FOR AD HOC SECURITY
                                          When dealing with “Big Data,” the volume and types of data about IT and the business
                                          are too great to process in an ad hoc manner. Moreover, it has become increasingly
                                          difficult to secure meaningful information from the data being collected.

                                          Despite significant investment in information security, attackers appear to be getting
                                          the upper hand. According to the Verizon Data Breach Investigations report (2012), 91
                                          percent of breaches led to data compromise within “days” or less, whereas 79 percent
                                          of breaches took “weeks” or more to discover.
                                          There are a number of factors that explain this:
                                          •   Attackers are becoming more organized and better funded. But while attacks have
                                              become dynamic, defenses have remained static. Today’s attacks are designed to
                                              exploit the weaknesses of our user-centric, hyper-connected infrastructures.
                                          •   IT-enabled organizations continue to grow more complex. Organizations now
                                              demand much more open and agile systems, creating incredible new opportunities
                                              for collaboration, communication, and innovation. This also results in new
                                              vulnerabilities that cyber criminals, “hacktivist” groups, and nation states have
                                              learned to exploit.
                                          •   Compliance is even more far reaching. Regulators and legislators are getting more
                                              prescriptive. Companies, particularly those with multiple lines of business or
                                              international operations, have an increasingly hard time keeping track of current
                                              controls that are in place, controls that are needed, and how to ensure controls
                                              are being managed properly.
The combined effect of these factors in IT environments makes security management
much more complex, with many more interdependencies and a wider scope of
responsibility. As more business processes become digitized, security teams have both
the opportunity and the challenge to collect and manage more data. Investments are
increasingly made in log management, vulnerability management, identity
management, and configuration management tools. However, breaches continue to
happen, causing more disruption and expense than ever.



THE THREE FOUNDATIONAL CONCEPTS OF BIG
DATA IN SECURITY MANAGEMENT
A true “Big Data” strategy for security management must encompass all of
three aspects – the infrastructure, the analytic tools and intelligence – to
properly address the issues at hand.




                  Figure 1. The pillars of Big Data in security management



To extract value from data being gathered, drive efficiency into threat management
activities, and use compliance activities to drive decision making, security teams need
a to take “Big Data” approach to security management. This means having:
•   An agile “scale out” infrastructure to respond to the changing IT environment and
    evolving threats. Security management needs to support new business initiatives
    that impact IT, from new applications to new delivery models like mobility,
    virtualization, cloud computing, and outsourcing. The security management
    infrastructure must be able to collect and manage security data on an enterprise
    scale, scale to what today’s enterprises demand, both physically and economically.
    This means “scaling out” rather than “scaling up”, since centralizing all this data
    will be practically impossible. Also, the infrastructure needs to extend easily to
    adapt to new environments and readily evolve to support the analysis of evolving
    threats.

•   Analytics and visualization tools that support security analyst specialties. Security
    professionals require specialized analytic tools to support their work. Some
    analysts require tools to facilitate basic event identification with some supporting
    detail. Managers may require only high-level visualization and trending of key
    metrics. Malware analysts need reconstructed suspect files and tools to automate
    testing of those files. Network forensics analysts need full reconstruction of all log
    and network information about a session to determine precisely what happened.
•   Threat intelligence to apply data analytic techniques to the information collected.
    Organizations require a view of the current external threat environment in order to
    correlate with information gathered from within the organization itself. This
    correlation is key for analysts to gain a clear understanding of current threat
    indicators and what to look for.
“Big Data” does not equate simply to “lots of data.” It demands significantly
more intelligent analytics to spot security threats early on, with the
infrastructure to collect and process data at scale.
“BIG DATA” DRIVES EFFICIENT, PRODUCTIVE
SECURITY
Successful security management for “Big Data” requires a system that can
extract and present key data for analysis in the quickest and most effective
manner.




                  Figure 2. Requirements for a security management Big Data system


Security organizations today need to take a “Big Data” approach, including
understanding adversaries, determining what data they need to support decisions, and
building and operationalizing a model to support these activities. When referencing
“Big Data” in this context, this is about building a foundation for useful analytics,
rather than running headlong into an advanced data science project. Successful “Big
Data” systems for security organizations need to:
•   Eliminate tedious manual tasks in routine response or assessment activities. The
    system needs to reduce the number of manual, repetitive tasks associated with
    investigating an issue – like toggling between consoles and executing the same
    search in five different tools. While these tasks will not be eliminated overnight,
    the system should consistently reduce the number of steps per incidents
•   Use business context to point analysts toward highest impact issues. Security
    teams need to be able to map the systems they monitor and manage back to the
    critical applications and business processes they support. They need to understand
    the dependencies between these systems and third parties, like service providers,
    and understand the current state of their environment from a vulnerability and
    compliance standpoint.

•   Present only the most relevant data to analysts. Security professionals often refer
    to “reducing false positives.” In reality, issues are usually more nuanced than false
    versus true. Rather, the system needs to eliminate “noise,” and provide pointers
    for analysts to hone in on the most high-impact issues. The system also needs to
    provide supporting data in a way that highlights what are likely the biggest
    problems and why.
•   Augment human knowledge. The system can help the analyst spend time
    analyzing the most critical items. This includes providing built-in techniques for
    identifying the most high priority issues, as well as current threat intelligence that
    uses those techniques to identify the latest tools, techniques, and procedures in
    use by the attacker community.
•   See ‘over the horizon.’ Defense against modern threats is a race against time. The
    system needs to provide early warning –and eventually predictive model -
    marrying external threat intelligence with internal situational awareness to move
    the security team from passive defense to active defense and prevention.

SECURITY ANALYTICS: A STAGED APPROACH FOR “BIG DATA”
While advanced techniques like predictive analytics and statistical inference
will likely prove important techniques in the future, it is important for
security teams to begin by focusing on the basics, taking a staged approach.


•   Start by implementing a security data infrastructure that can grow with you. This
    involves implementing an architecture that can not only collect detailed
    information about logs, network sessions, vulnerabilities, configurations, and
    identities, but also human intelligence about what systems do and how they work.
    Although you may start small, the system needs to be based on a robust,
    distributed architecture to ensure scalability as your requirements evolve. The
    system must support logical domains of trust including legal jurisdictions, as well
    as data for business units or different projects. The system needs to be able to
    manipulate and pivot on this data quickly and easily (e.g., show all logs, network
    sessions and scan results from a given IP address and its communication to a
    production financial system).
•   Deploy basic analytic tools to automate repetitive human interactions. A nearer-
    term goal is often to create a model that correlates information visually to reduce
    the number of steps a human would need to take to gather all that information
    into one view (e.g., show all the logs and network sessions involving systems that
    support credit card transaction processing, and that are vulnerable to an attack
    seen in other parts of the business).
•   Create visualizations and outputs that support major security functions. Some
    analysts will only need to see the most suspicious events with some supporting
    detail. Malware analysts will need a prioritized list of suspect files and the reasons
    why they are suspect. Network forensics analysts will need detailed results of
    complex queries. Others will need to review scheduled compliance reports, or
    general reports used to spot trends or areas for improvement in the system. The
    system also needs to be open to enable another system to access data and use it
    to take an action against an attacker, like quarantine them or step up monitoring
    of what they are doing.
Figure 3. Steps for implementing Big Data in security management



•      Add more additional intelligent analytic methods. Only at this point should more
       complex analytics can be applied to the data in support of these roles. These
       analytics might include a combination of analytic techniques, such as defined rules
       to identify likely bad/known good behavior. It may also incorporate more
       advanced behavioral profiling and baselining techniques that deploy more
       advanced statistical techniques, like Bayesian Inference or predictive modeling.
       These analytic techniques can be used together to create an “influence model” – a
       model that combines different indicators to “score” issues the system has
       identified to lead the analyst to the areas that require the most urgent attention.
•      Improve the model on an ongoing basis. Once the system is up and running, it will
       need to be fine-tuned on an ongoing basis to respond to evolving threat vectors
       and changes to the organization. The system will need the ability to tweak rules
       tweaked and adjust models to eliminate noise, consume additional data both from
       inside and outside the organization, and incorporate self-learning functions to
       improve the overall success of the system.


The system will need to evolve and expand to respond to changes in the IT
environment as new IT services and applications come online, creating a cycle of
constant evolution and improvement. At each point, the system will need to leverage
external intelligence as inputs to the model.
    That means the system will need to have an automated way to consume external
feeds from threat intelligence sources; structured information including blacklists, rule
or queries; unstructured intelligence including pastebins, Twitter feeds or IRC chats;
and intelligence from internal message boards or notes from internal calls or meetings.
The system must also be able to facilitate collaboration around shared knowledge. The
system should share query results or unstructured intelligence either publicly, or in a
controlled fashion with mutually trusted communities of interest or on a “need-to-
know” basis.
FOUNDATIONAL INFRASTRUCTURE PAVES THE WAY FOR
MORE SOPHISTICATED TECHNIQUES
Security teams will greatly increase their likelihood of success in implementing “Big
Data” in security by focusing on first creating a scalable architecture and deploying
tools eliminating non-value added tasks. This will give “quick wins,” provide a solid
platform and free up staff to concentrate on deploying and managing more complex
analytic tools. Done properly this will:
•   Increase the efficiency of security analysts. The number of “issues per shift”
    analysts can deal with can be increased from a few to a dozen and beyond.
•   Reduce attacker free time and thus the impact of threats on the business. Analysts
    will be more automatically drawn to those issues which are most likely to cause
    problems and shut them down before they affect the business adversely.
Without this foundation or a clear, concrete objective in mind, a Big Data initiative
could easily flounder and not bring any of the expected gains.




RSA SECURITY MANAGEMENT: A FIRM
FOUNDATION FOR INFRASTRUCTURE,
ANALYTICS, AND INTELLIGENCE




RSAs Security Management portfolio provides customers with:

•   Comprehensive infrastructure visibility. RSA provides a proven infrastructure with
    the ability to collect all types of security data, at scale and from all types of data
    sources. This gives analysts a single place to view data about advanced threats
    and user activity from data gathered directly from the network or from key
    systems. RSA’s infrastructure also provides a unified architecture for real time
    analytics as well as near time and historical query. This provides a comprehensive
    approach to real-time alerting, investigative analysis, metrics and trending and
    historical retention and archiving.
•    Agile analytics. The RSA platform gives analysts the tools to perform rapid
                                              investigations – including intuitive tools for investigation presented for rapid
                                              analysis, with detailed drill down and incorporation of business context to better
                                              inform the decision making process. RSA’s approach provides the ability to hone
                                              in on the most suspicious users and endpoints connected to your infrastructure
                                              and tell-tale signs of malicious activity through signature-free analytics. Full
                                              session replace provides the Ability to recreate and replay exactly what happened.
                                         •    Actionable intelligence. Threat intelligence provided by RSA helps security analysts
                                              get the most value from RSA products by incorporating feeds of current threat
                                              information. RSA’s threat research team provides proprietary intelligence from a
                                              community of security experts, automatically built into our tools through rules,
                                              reports, parsers and watchlists. This allows analysts to gain insight into threats
                                              from data collected from the enterprise, and prioritize response actions by
                                              incorporating information from the business showing relationship between the
                                              systems involved and the business functions they support.

                                         •    Optimized incident management. RSA products help security teams streamline the
                                              diverse set of activities related to preparedness and response, by providing a
                                              workflow system to define and activate response processes, plus tools to track
                                              current open issues, trends and lessons learned. Industry leading services to help
                                              prepare, detect and respond to incidents. The platform integrates with the RSA
                                              portfolio and third party tools to exchange information with the wide range of tools
                                              needed to identify and handle incidents and streaming compliance management.




CONTACT US
To learn more about how EMC
products, services, and solutions can
help solve your business and IT          EMC2, EMC, the EMC logo, [add other applicable product trademarks in alphabetical order] are
                                         registered trademarks or trademarks of EMC Corporation in the United States and other countries.
challenges, contact your local
                                         VMware [add additional per above, if required] are registered trademarks or trademarks of
representative or authorized reseller—   VMware, Inc., in the United States and other jurisdictions. © Copyright 2012 EMC Corporation. All
or visit us at www.EMC.com/rsa.          rights reserved. Published in the USA. 0812 Solution Overview HSMCBD0812

                                         EMC believes the information in this document is accurate as of its publication date. The
                                         information is subject to change without notice.

More Related Content

What's hot

AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
Forcepoint LLC
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
Databricks
 
Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detection
Zensar Technologies Ltd.
 
AXA x DSSG Meetup Sharing (Feb 2016)
AXA x DSSG Meetup Sharing (Feb 2016)AXA x DSSG Meetup Sharing (Feb 2016)
AXA x DSSG Meetup Sharing (Feb 2016)
Eugene Yan Ziyou
 
Impact of machine learning on banking sector
Impact of machine learning on banking sectorImpact of machine learning on banking sector
Impact of machine learning on banking sector
Abhishek Verma
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurity
idsecconf
 
Brighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paperBrighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paper
Andrew Morrison
 
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomFraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Sudarson Roy Pratihar
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
Simran Mondal
 
Uses of analytics in the field of Banking
Uses of analytics in the field of BankingUses of analytics in the field of Banking
Uses of analytics in the field of Banking
Niveditasri N
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...
Francesca Lazzeri, PhD
 
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best FriendCognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
SparkCognition
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
Stefaan Van daele
 
Machine Learning in Banking
Machine Learning in Banking Machine Learning in Banking
Machine Learning in Banking
vrtanes
 
Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client Presentation
Ayapparaj SKS
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
Tony Martin-Vegue
 
Masters thesis - Fraud & Big Data
Masters thesis - Fraud & Big DataMasters thesis - Fraud & Big Data
Masters thesis - Fraud & Big Data
Stephanie Canovas
 
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NCSmart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
Mary Jane Clark
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
CMR WORLD TECH
 

What's hot (20)

AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
 
Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detection
 
AXA x DSSG Meetup Sharing (Feb 2016)
AXA x DSSG Meetup Sharing (Feb 2016)AXA x DSSG Meetup Sharing (Feb 2016)
AXA x DSSG Meetup Sharing (Feb 2016)
 
CVtesting
CVtestingCVtesting
CVtesting
 
Impact of machine learning on banking sector
Impact of machine learning on banking sectorImpact of machine learning on banking sector
Impact of machine learning on banking sector
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurity
 
Brighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paperBrighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paper
 
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomFraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
Uses of analytics in the field of Banking
Uses of analytics in the field of BankingUses of analytics in the field of Banking
Uses of analytics in the field of Banking
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...
 
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best FriendCognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
Machine Learning in Banking
Machine Learning in Banking Machine Learning in Banking
Machine Learning in Banking
 
Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client Presentation
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
 
Masters thesis - Fraud & Big Data
Masters thesis - Fraud & Big DataMasters thesis - Fraud & Big Data
Masters thesis - Fraud & Big Data
 
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NCSmart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
Smart Predictive Data Analysis by MJ Clark Business Consulting Raleigh NC
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 

Viewers also liked

Mit2 092 f09_lec20
Mit2 092 f09_lec20Mit2 092 f09_lec20
Mit2 092 f09_lec20
Rahman Hakim
 
Գրական ակումբ
Գրական ակումբԳրական ակումբ
Գրական ակումբ
tatevabrahamyan
 
Hotel1
Hotel1Hotel1
Hotel1
nicoclementi
 
ภาคผนวก (1)
ภาคผนวก (1)ภาคผนวก (1)
ภาคผนวก (1)einscream
 
Linux kursu-kayseri
Linux kursu-kayseriLinux kursu-kayseri
Linux kursu-kayserisersld67
 
Introduction of Biochemistry
Introduction of BiochemistryIntroduction of Biochemistry
Introduction of Biochemistry
Asheesh Pandey
 
Unit 8 book
Unit 8 book Unit 8 book
Unit 8 book
butcher665
 
Argentina. 2013, regimen exteriorizacion moneda extranjera. dr. javier arriola
Argentina. 2013, regimen  exteriorizacion moneda extranjera. dr. javier arriolaArgentina. 2013, regimen  exteriorizacion moneda extranjera. dr. javier arriola
Argentina. 2013, regimen exteriorizacion moneda extranjera. dr. javier arriola
Carlos María Folco
 
UNA CIUDAD DE 1950
UNA CIUDAD DE 1950UNA CIUDAD DE 1950
UNA CIUDAD DE 1950Jorge Llosa
 
PÁJAROS PORTADORES DE MENSAJES
PÁJAROS PORTADORES DE MENSAJESPÁJAROS PORTADORES DE MENSAJES
PÁJAROS PORTADORES DE MENSAJESJorge Llosa
 
Thurs banking
Thurs bankingThurs banking
Thurs banking
Travis Klein
 
Monopoly types
Monopoly typesMonopoly types
Monopoly types
Travis Klein
 
Black history from another angle
Black history from another angleBlack history from another angle
Black history from another angle
janetcheathambell
 

Viewers also liked (20)

Mit2 092 f09_lec20
Mit2 092 f09_lec20Mit2 092 f09_lec20
Mit2 092 f09_lec20
 
Գրական ակումբ
Գրական ակումբԳրական ակումբ
Գրական ակումբ
 
Modul9 aids
Modul9 aidsModul9 aids
Modul9 aids
 
Hotel1
Hotel1Hotel1
Hotel1
 
ภาคผนวก (1)
ภาคผนวก (1)ภาคผนวก (1)
ภาคผนวก (1)
 
Linux kursu-kayseri
Linux kursu-kayseriLinux kursu-kayseri
Linux kursu-kayseri
 
Introduction of Biochemistry
Introduction of BiochemistryIntroduction of Biochemistry
Introduction of Biochemistry
 
Unit 8 book
Unit 8 book Unit 8 book
Unit 8 book
 
Argentina. 2013, regimen exteriorizacion moneda extranjera. dr. javier arriola
Argentina. 2013, regimen  exteriorizacion moneda extranjera. dr. javier arriolaArgentina. 2013, regimen  exteriorizacion moneda extranjera. dr. javier arriola
Argentina. 2013, regimen exteriorizacion moneda extranjera. dr. javier arriola
 
UNA CIUDAD DE 1950
UNA CIUDAD DE 1950UNA CIUDAD DE 1950
UNA CIUDAD DE 1950
 
PÁJAROS PORTADORES DE MENSAJES
PÁJAROS PORTADORES DE MENSAJESPÁJAROS PORTADORES DE MENSAJES
PÁJAROS PORTADORES DE MENSAJES
 
1 c
1 c1 c
1 c
 
Europa Cerrada
Europa CerradaEuropa Cerrada
Europa Cerrada
 
ภาคผนวก
ภาคผนวกภาคผนวก
ภาคผนวก
 
Cybernetics of knowledge
Cybernetics of knowledgeCybernetics of knowledge
Cybernetics of knowledge
 
Thurs banking
Thurs bankingThurs banking
Thurs banking
 
Monopoly types
Monopoly typesMonopoly types
Monopoly types
 
Black history from another angle
Black history from another angleBlack history from another angle
Black history from another angle
 
Wed militarism
Wed militarismWed militarism
Wed militarism
 
Jurnal
JurnalJurnal
Jurnal
 

Similar to Getting Real About Security Management and “Big Data”

Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityIndustry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
EMC
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
Keith Braswell
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
EMC
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
Joseph DeFever
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentse.law International
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
Naveed Ahmed
 
Idc cost complexitycompliance
Idc cost complexitycomplianceIdc cost complexitycompliance
Idc cost complexitycomplianceReadWrite
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
EMC
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
wbesse
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Neil Raden
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
EMC
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
Booz Allen Hamilton
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Troy Marshall
 

Similar to Getting Real About Security Management and “Big Data” (20)

Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityIndustry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documents
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
Idc cost complexitycompliance
Idc cost complexitycomplianceIdc cost complexitycompliance
Idc cost complexitycompliance
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Getting Real About Security Management and “Big Data”

  • 1. GETTTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics It’s an exciting yet daunting time to be a security professional. Security threats are ESSENTIALS becoming more aggressive and voracious. Governments and industry bodies are This paper examines: getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, • Escalating complexity of the new “Big Data” technologies purport bringing advanced analytic techniques like security management predictive analysis and advanced statistical techniques close to the security environment, from threats to IT professional. environments to compliance mandates Given the state of today’s security systems, most organizations are a long way from using these types of advanced technologies for security management. Security • How to get more meaning from professionals need to get more value from the data already collected and analyzed. data already collected, by They also need a better understanding of both current issues and impending “eliminating the hay from the challenges related to data. Starting with a foundational set of data management and haystack” rather than “looking for analytic capabilities enables organizations to effectively build and scale security the needles” management as the enterprise evolves to meet Big Data challenges. • The combination of infrastructure, analytic tools, and threat TODAY'S SECURITY LANDSCAPE LEAVES NO intelligence needed to drive business value from Big Data ROOM FOR AD HOC SECURITY When dealing with “Big Data,” the volume and types of data about IT and the business are too great to process in an ad hoc manner. Moreover, it has become increasingly difficult to secure meaningful information from the data being collected. Despite significant investment in information security, attackers appear to be getting the upper hand. According to the Verizon Data Breach Investigations report (2012), 91 percent of breaches led to data compromise within “days” or less, whereas 79 percent of breaches took “weeks” or more to discover. There are a number of factors that explain this: • Attackers are becoming more organized and better funded. But while attacks have become dynamic, defenses have remained static. Today’s attacks are designed to exploit the weaknesses of our user-centric, hyper-connected infrastructures. • IT-enabled organizations continue to grow more complex. Organizations now demand much more open and agile systems, creating incredible new opportunities for collaboration, communication, and innovation. This also results in new vulnerabilities that cyber criminals, “hacktivist” groups, and nation states have learned to exploit. • Compliance is even more far reaching. Regulators and legislators are getting more prescriptive. Companies, particularly those with multiple lines of business or international operations, have an increasingly hard time keeping track of current controls that are in place, controls that are needed, and how to ensure controls are being managed properly.
  • 2. The combined effect of these factors in IT environments makes security management much more complex, with many more interdependencies and a wider scope of responsibility. As more business processes become digitized, security teams have both the opportunity and the challenge to collect and manage more data. Investments are increasingly made in log management, vulnerability management, identity management, and configuration management tools. However, breaches continue to happen, causing more disruption and expense than ever. THE THREE FOUNDATIONAL CONCEPTS OF BIG DATA IN SECURITY MANAGEMENT A true “Big Data” strategy for security management must encompass all of three aspects – the infrastructure, the analytic tools and intelligence – to properly address the issues at hand. Figure 1. The pillars of Big Data in security management To extract value from data being gathered, drive efficiency into threat management activities, and use compliance activities to drive decision making, security teams need a to take “Big Data” approach to security management. This means having:
  • 3. An agile “scale out” infrastructure to respond to the changing IT environment and evolving threats. Security management needs to support new business initiatives that impact IT, from new applications to new delivery models like mobility, virtualization, cloud computing, and outsourcing. The security management infrastructure must be able to collect and manage security data on an enterprise scale, scale to what today’s enterprises demand, both physically and economically. This means “scaling out” rather than “scaling up”, since centralizing all this data will be practically impossible. Also, the infrastructure needs to extend easily to adapt to new environments and readily evolve to support the analysis of evolving threats. • Analytics and visualization tools that support security analyst specialties. Security professionals require specialized analytic tools to support their work. Some analysts require tools to facilitate basic event identification with some supporting detail. Managers may require only high-level visualization and trending of key metrics. Malware analysts need reconstructed suspect files and tools to automate testing of those files. Network forensics analysts need full reconstruction of all log and network information about a session to determine precisely what happened. • Threat intelligence to apply data analytic techniques to the information collected. Organizations require a view of the current external threat environment in order to correlate with information gathered from within the organization itself. This correlation is key for analysts to gain a clear understanding of current threat indicators and what to look for. “Big Data” does not equate simply to “lots of data.” It demands significantly more intelligent analytics to spot security threats early on, with the infrastructure to collect and process data at scale.
  • 4. “BIG DATA” DRIVES EFFICIENT, PRODUCTIVE SECURITY Successful security management for “Big Data” requires a system that can extract and present key data for analysis in the quickest and most effective manner. Figure 2. Requirements for a security management Big Data system Security organizations today need to take a “Big Data” approach, including understanding adversaries, determining what data they need to support decisions, and building and operationalizing a model to support these activities. When referencing “Big Data” in this context, this is about building a foundation for useful analytics, rather than running headlong into an advanced data science project. Successful “Big Data” systems for security organizations need to: • Eliminate tedious manual tasks in routine response or assessment activities. The system needs to reduce the number of manual, repetitive tasks associated with investigating an issue – like toggling between consoles and executing the same search in five different tools. While these tasks will not be eliminated overnight, the system should consistently reduce the number of steps per incidents • Use business context to point analysts toward highest impact issues. Security teams need to be able to map the systems they monitor and manage back to the critical applications and business processes they support. They need to understand the dependencies between these systems and third parties, like service providers, and understand the current state of their environment from a vulnerability and compliance standpoint. • Present only the most relevant data to analysts. Security professionals often refer to “reducing false positives.” In reality, issues are usually more nuanced than false versus true. Rather, the system needs to eliminate “noise,” and provide pointers for analysts to hone in on the most high-impact issues. The system also needs to provide supporting data in a way that highlights what are likely the biggest problems and why.
  • 5. Augment human knowledge. The system can help the analyst spend time analyzing the most critical items. This includes providing built-in techniques for identifying the most high priority issues, as well as current threat intelligence that uses those techniques to identify the latest tools, techniques, and procedures in use by the attacker community. • See ‘over the horizon.’ Defense against modern threats is a race against time. The system needs to provide early warning –and eventually predictive model - marrying external threat intelligence with internal situational awareness to move the security team from passive defense to active defense and prevention. SECURITY ANALYTICS: A STAGED APPROACH FOR “BIG DATA” While advanced techniques like predictive analytics and statistical inference will likely prove important techniques in the future, it is important for security teams to begin by focusing on the basics, taking a staged approach. • Start by implementing a security data infrastructure that can grow with you. This involves implementing an architecture that can not only collect detailed information about logs, network sessions, vulnerabilities, configurations, and identities, but also human intelligence about what systems do and how they work. Although you may start small, the system needs to be based on a robust, distributed architecture to ensure scalability as your requirements evolve. The system must support logical domains of trust including legal jurisdictions, as well as data for business units or different projects. The system needs to be able to manipulate and pivot on this data quickly and easily (e.g., show all logs, network sessions and scan results from a given IP address and its communication to a production financial system). • Deploy basic analytic tools to automate repetitive human interactions. A nearer- term goal is often to create a model that correlates information visually to reduce the number of steps a human would need to take to gather all that information into one view (e.g., show all the logs and network sessions involving systems that support credit card transaction processing, and that are vulnerable to an attack seen in other parts of the business). • Create visualizations and outputs that support major security functions. Some analysts will only need to see the most suspicious events with some supporting detail. Malware analysts will need a prioritized list of suspect files and the reasons why they are suspect. Network forensics analysts will need detailed results of complex queries. Others will need to review scheduled compliance reports, or general reports used to spot trends or areas for improvement in the system. The system also needs to be open to enable another system to access data and use it to take an action against an attacker, like quarantine them or step up monitoring of what they are doing.
  • 6. Figure 3. Steps for implementing Big Data in security management • Add more additional intelligent analytic methods. Only at this point should more complex analytics can be applied to the data in support of these roles. These analytics might include a combination of analytic techniques, such as defined rules to identify likely bad/known good behavior. It may also incorporate more advanced behavioral profiling and baselining techniques that deploy more advanced statistical techniques, like Bayesian Inference or predictive modeling. These analytic techniques can be used together to create an “influence model” – a model that combines different indicators to “score” issues the system has identified to lead the analyst to the areas that require the most urgent attention. • Improve the model on an ongoing basis. Once the system is up and running, it will need to be fine-tuned on an ongoing basis to respond to evolving threat vectors and changes to the organization. The system will need the ability to tweak rules tweaked and adjust models to eliminate noise, consume additional data both from inside and outside the organization, and incorporate self-learning functions to improve the overall success of the system. The system will need to evolve and expand to respond to changes in the IT environment as new IT services and applications come online, creating a cycle of constant evolution and improvement. At each point, the system will need to leverage external intelligence as inputs to the model. That means the system will need to have an automated way to consume external feeds from threat intelligence sources; structured information including blacklists, rule or queries; unstructured intelligence including pastebins, Twitter feeds or IRC chats; and intelligence from internal message boards or notes from internal calls or meetings. The system must also be able to facilitate collaboration around shared knowledge. The system should share query results or unstructured intelligence either publicly, or in a controlled fashion with mutually trusted communities of interest or on a “need-to- know” basis.
  • 7. FOUNDATIONAL INFRASTRUCTURE PAVES THE WAY FOR MORE SOPHISTICATED TECHNIQUES Security teams will greatly increase their likelihood of success in implementing “Big Data” in security by focusing on first creating a scalable architecture and deploying tools eliminating non-value added tasks. This will give “quick wins,” provide a solid platform and free up staff to concentrate on deploying and managing more complex analytic tools. Done properly this will: • Increase the efficiency of security analysts. The number of “issues per shift” analysts can deal with can be increased from a few to a dozen and beyond. • Reduce attacker free time and thus the impact of threats on the business. Analysts will be more automatically drawn to those issues which are most likely to cause problems and shut them down before they affect the business adversely. Without this foundation or a clear, concrete objective in mind, a Big Data initiative could easily flounder and not bring any of the expected gains. RSA SECURITY MANAGEMENT: A FIRM FOUNDATION FOR INFRASTRUCTURE, ANALYTICS, AND INTELLIGENCE RSAs Security Management portfolio provides customers with: • Comprehensive infrastructure visibility. RSA provides a proven infrastructure with the ability to collect all types of security data, at scale and from all types of data sources. This gives analysts a single place to view data about advanced threats and user activity from data gathered directly from the network or from key systems. RSA’s infrastructure also provides a unified architecture for real time analytics as well as near time and historical query. This provides a comprehensive approach to real-time alerting, investigative analysis, metrics and trending and historical retention and archiving.
  • 8. Agile analytics. The RSA platform gives analysts the tools to perform rapid investigations – including intuitive tools for investigation presented for rapid analysis, with detailed drill down and incorporation of business context to better inform the decision making process. RSA’s approach provides the ability to hone in on the most suspicious users and endpoints connected to your infrastructure and tell-tale signs of malicious activity through signature-free analytics. Full session replace provides the Ability to recreate and replay exactly what happened. • Actionable intelligence. Threat intelligence provided by RSA helps security analysts get the most value from RSA products by incorporating feeds of current threat information. RSA’s threat research team provides proprietary intelligence from a community of security experts, automatically built into our tools through rules, reports, parsers and watchlists. This allows analysts to gain insight into threats from data collected from the enterprise, and prioritize response actions by incorporating information from the business showing relationship between the systems involved and the business functions they support. • Optimized incident management. RSA products help security teams streamline the diverse set of activities related to preparedness and response, by providing a workflow system to define and activate response processes, plus tools to track current open issues, trends and lessons learned. Industry leading services to help prepare, detect and respond to incidents. The platform integrates with the RSA portfolio and third party tools to exchange information with the wide range of tools needed to identify and handle incidents and streaming compliance management. CONTACT US To learn more about how EMC products, services, and solutions can help solve your business and IT EMC2, EMC, the EMC logo, [add other applicable product trademarks in alphabetical order] are registered trademarks or trademarks of EMC Corporation in the United States and other countries. challenges, contact your local VMware [add additional per above, if required] are registered trademarks or trademarks of representative or authorized reseller— VMware, Inc., in the United States and other jurisdictions. © Copyright 2012 EMC Corporation. All or visit us at www.EMC.com/rsa. rights reserved. Published in the USA. 0812 Solution Overview HSMCBD0812 EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice.