SlideShare a Scribd company logo
Haystax Carbon for Enterprise 
Threat Management 
Actionable Intelligence for Decision 
Makers 
COMPANY PROPRIETARY INFORMATION
Haystax Technology offers 
Advanced analytic solutions that provide 
real time actionable intelligence for 
complex, high consequence decisions 
COMPANY PROPRIETARY INFORMATION 1 
About us
Our heritage is in designing elegant solutions for 
complex problems not suited for traditional “brute force” 
analytic approaches 
We have multiple patents for our 
predictive models & algorithms 
DHS used our algorithms for risk 
based grant allocation 
Our analytics now drive the largest 
public safety ecosystem in the nation 
We developed the protective 
intelligence methodology used by 
the Bill & Melinda Gates Foundation 
COMPANY PROPRIETARY INFORMATION 2
COMPANY PROPRIETARY INFORMATION 3
At the core of our Insider Threat management solution 
is our innovative, proven & efficient Carbon Risk 
Rating Platform 
Designed to leverage existing 
source data investments 
Designed to fit into existing 
investigation processes 
Includes the high performance 
Haystax Constellation Analytics 
Engine 
Designed to enable a wide range 
of mission optimized business 
applications 
Data can be easily handed off for post processing 
to other applications 
Investigative 
Case 
Construction 
3rd Party Analytic 
Processors 
Haystax Carbon Risk Rating 
Continuous 
Evaluation 
Engine 
Carbon Whole 
Person Model 
Risk Dashboard 
Adjudicative 
Guideline 
Mapping 
Expert 
Assessments 
Continuous Data 
Collection 
Works with a wide range of data sources/types 
Background 
Check 
Peers & 
Family 
$ 
Financial 
Records 
HR 
Record 
Public 
Records 
Web and 
Social Media 
COMPANY PROPRIETARY INFORMATION 4
Haystax Carbon is based on the understanding that 
Insider Threat Management is a prioritization problem 
Carbon 
Automated 
Evaluation 
Rotate from 
Service Or Exploit 
COMPANY PROPRIETARY INFORMATION 5 
Continuous Data 
Experts & Guideline 
Compliance 
Backgroun 
d Check 
Peers & 
Family 
$ 
Collection 
Carbon Whole 
Person Model 
Carbon Prioritization 
Ranking 
Escalated Response 
Spend << Time 
Spend << $$ 
Financial 
Records Public 
Records 
HR 
Record 
Web and Social 
Media
The Carbon Whole Person Model provides a single 
integrated view of an insider for dynamic trust 
Outside Work At Work 
Single 
Integrated 
View 
Public Records 
Employment Data (Current 
& History) 
Vehicle/Property 
Ownership 
Bank/Credit Records 
Criminal Records 
Family/Peer Comments 
Time In/Out 
Access Card Swipes 
Logins/Logouts 
Network Use 
Database/Data Store Access 
Printer User 
Telecom/Email Use 
Patterns of Use 
Continuous Evaluation Continuous Monitoring 
COMPANY PROPRIETARY INFORMATION 6
Adjudicative Guidelines are mathematically modeled into 
Carbon to ensure policy compliance at all times 
Clearance-worthy 
Trustworthy Able to 
Indicativ 
e 
Mapping 
Risk 
Influence 
13 Guidelines 
AC-f 
COMPANY PROPRIETARY INFORMATION 7 
Enforces scoring 
results to compliance 
guidelines 
Enables scoring rules 
to adjust based on 
policy changes 
Improves 
transparency for risk 
rating results 
Disqualifying 
Conditions 
AC-a 
AC-b 
AC-c 
AC-d 
AC-e 
AC-g 
AC-h 
AL-a 
AL-b 
AL-c 
. 
. 
. 
Alcohol Consumption 
Allegiant 
to the 
United States 
Unsusceptible 
to coercion 
protect classified 
information 
Willing to protect 
classified 
Unsusceptible information 
to inducement
‘Qualitative’ expert knowledge augments existing data to 
align insider behavior to an organization’s specific 
threats 
IT 
Security 
HUMINT 
Psych 
Counterintelligence 
Medical 
Criminal Investigators 
Command 
Peers 
Family 
Subject 
SF86 
$ 
Financial 
Records 
Public 
Records 
PAEI 
Carbon scales experts with 
algorithms 
Reflects knowledge of experts in 
the Carbon Whole Person Model 
Applies data about the subject to 
the Carbon Whole Person model 
Evaluates the model’s knowledge 
continuously as data or priorities 
change 
COMPANY PROPRIETARY INFORMATION 8
Carbon is designed to make the results easy to 
understand for a wide range of end users 
COMPANY PROPRIETARY INFORMATION 9 
Risk timeline, 
Alerts, dashboards, 
Summary level 
views and drill 
downs 
Compare subject to 
peer groups and 
historic changes in 
risk profile 
Insider Risk Rating Report 
Insider Pattern of life 
Timeline 
Insider Risk 
Dashboard
The Carbon Risk Rating runs on the Haystax Constellation 
Analytic Platform 
The Constellation Analytics is 
optimized for high velocity and high 
volume data processing 
COMPANY PROPRIETARY INFORMATION 10 
Data feeds 
Analytic 
Processors 
Carbon Model 
Natural Language 
Entity Resolution 
Geo Reasoning 
Association 
Analysis 
Scoring 
Actionable Intelligence through 
automated discovery, fusing and linking of 
information with out-of-the box 
visualizations 
Built with Open 
Source 
Flexible cloud 
deployment 
Built using 
multiple Haystax 
patents
Carbon doesn’t just identify risk, but prioritizes it to enable 
an optimized Insider Threat management system 
Dynamic 
IDAM 
Escalated Response 
Rotate from 
Service Or Exploit 
Professional 
Observation / 
Intervention 
Non-Professional 
Observation / 
Intervention 
Escalated Review 
/ Additional Data 
Spend << Time 
Spend << $$ 
Few 
People 
More 
People 
Expensive 
Data 
Enterprise 
Data 
Basic IT 
Controls 
Carbon can be easily integrated into existing Insider 
Threat Management Systems 
COMPANY PROPRIETARY INFORMATION 11
The Carbon Risk Rating Platform can serve a wide 
range of applications 
E-Adjudication Automated Periodic 
Reviews 
Insider Threat 
Investigations 
Continuous Evaluation 
PTSD Suicide 
Prevention Workplace Violence 
COMPANY PROPRIETARY INFORMATION 12
Carbon is designed to integrate into the overall enterprise 
security system – Cyber Example 
Log Management / Searching SIEM Threat Management Insider Threat 
Secure Cloud Gateway 
SSL Transfer 
COMPANY PROPRIETARY INFORMATION 13 
Peer 
Network 
Peer 
Network 
Monitored 
Network 
Device 
Device 
OTX
How is Carbon different from 
traditional Insider Threat 
detection & management? 
COMPANY PROPRIETARY INFORMATION 14
The typical approach is to tackle Insider Threat 
as a signal to noise problem 
Traditional rules based 
systems rely on 
knowing ‘precisely’ what 
a target looks like 
Targ 
Miss 
False 
Alar 
m 
et 
Traditional rules based thresholds or 
flags will identify the obvious, but 
miss weak signals 
Lowering thresholds will dramatically 
increase false alarms, increase 
investigation time & cost, negatively 
impact continuous evaluation 
How do you strike a balance between 
false alarm rates & missed detections? 
COMPANY PROPRIETARY INFORMATION 15
However, Insider Threat is not a classic signal to noise 
problem that rules based systems can negotiate well 
Targ 
et 
Miss 
False Alarms 
Our current systems rely on self-reporting 
and tips before an 
investigation can be launched 
Data is available to improve early 
detection, but complex rules 
based systems will generate high 
numbers of flags 
Unlike physical objects, people 
change so systems need to 
account for their “pattern of life”, 
Has 
financial 
problem? 
Has 
alcohol 
problem? 
Has work 
problems 
? 
Has 
psychologic 
al problems? 
not static rules Approach was designed for 
manual operation on small, 
infrequent queries 
COMPANY PROPRIETARY INFORMATION 16
The ACES Pilot for the DoD showed that traditional rules 
based approach are too efficient to be viable for large 
Data 
populations 
+ 
Rules Based 
Detection 
Results 
Alarm 
s 
 3,370 reviewed 
 3,077 total flags identified 
 2,783 cases created 
 4 Significant Incident Reports 
 2 Imminent Threats 
FALSE POSITIVE RATE >20% 
At this false alarm rate, the USG 
would generate over 1,000 cases 
each day! 
Developed by psychologists over 15 
years ago – the ideas are useful, 
but it is not a modern software 
system 
None of the ACES flags are 
prioritized or machine readable 
placing all of the burden on human 
analysts 
COMPANY PROPRIETARY INFORMATION 17
The Target cyber fraud case is an example of the 
problem of sub-optimal alert prioritization 
COMPANY PROPRIETARY INFORMATION 18 
Headlines make it appear 
that threat detection 
worked 
However, information 
needs to be actionable & 
prioritized 
Systems that generate 
too many false positives 
are a nuisance 
The analytic challenge is to scale the 
human element to connect-the-dots 
faster
Haystax Carbon helps overcome the limitations of existing 
detection systems for Insider Threat management 
$ 
Continuous data 
collection 
HUMINT 
Trustworthy Able to 
Unsusceptible 
to coercion 
Unsusceptible 
to inducement 
Indicative Mapping 
Alcohol Consumption 
Willing to protect 
classified 
information 
Disqualifying 
conditions 
protect classified 
information 
AC-a 
AC-b 
AC-c 
AC-d 
AC-e 
AC-f 
AC-g 
AC-h 
AL-a 
AL-b 
AL-c 
. 
. 
. 
Allegiant 
to the 
United States 
Risk 
Influence 
13 Guidelines 
Command 
Peers 
Rotate from 
Service Or Exploit 
Dynamic 
IDAM 
COMPANY PROPRIETARY INFORMATION 19 
Carbon Whole Person 
Bayesian Model 
Mathematical configuration of 
adjudicative guidelines 
Few 
People 
Expensive 
Data 
Prioritization algorithm optimizes 
threat management 
Counterintelligence 
Medical 
Criminal Investigators 
Family 
Psych 
Subject 
IT Security 
SF86 
Financial 
Records 
Public 
Records 
PAEI 
Expert judgments 
integrated into model 
Escalated Response 
Spend << Time 
Spend << $$ 
More 
People 
DoD 
Data 
Professional 
Observation / 
Intervention 
Non-Professional 
Observation / 
Intervention 
Escalated Review 
/ Additional Data 
Basic IT 
Controls
Haystax Carbon provides an analytic solution to 
Insider Threat detection & management that 
cannot be matched by traditional approaches 
Bayesian whole person model provides contextual 
analysis that rules-based systems cannot match for relevant results 
Model driven data ingest beats or matches brute force 
‘big machine’ at a fraction of the cost 
Prioritization algorithm enables focusing investigative 
human resources on true high-risk individuals 
COMPANY PROPRIETARY INFORMATION 20
Haystax: A new kind of Analytics Company 
We are mature enough to have 
proven technologies, but new enough to 
create cutting edge products and 
deliver one-of-a kind services to the 
national security community 
COMPANY PROPRIETARY INFORMATION 21
Contact us: info@haystax.com 
Visit us: www.haystax.com 
8251 Greensboro Drive, Suite 1111 
McLean, VA 22012 
COMPANY PROPRIETARY INFORMATION

More Related Content

What's hot

2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
Scalar Decisions
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
Globus
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
Steve Knapp
 
Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)
Amy Stowers
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
Harmaldeep Cassam
 
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsEma report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Anjoum .
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
Tripwire
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
LexisNexis Risk Solutions
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
patmisasi
 
veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2
Marius Ghinea
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program Assessments
John Anderson
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
Haystax Technology
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm Data
Rocket Matter, LLC
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
Synack
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
John Loveland
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
Meridian
 
The 10 Most Trusted Healthcare IT Security Solution Providers 2018
The 10 Most Trusted Healthcare IT Security Solution Providers 2018The 10 Most Trusted Healthcare IT Security Solution Providers 2018
The 10 Most Trusted Healthcare IT Security Solution Providers 2018
insightscare
 

What's hot (20)

2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
 
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsEma report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program Assessments
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm Data
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
 
The 10 Most Trusted Healthcare IT Security Solution Providers 2018
The 10 Most Trusted Healthcare IT Security Solution Providers 2018The 10 Most Trusted Healthcare IT Security Solution Providers 2018
The 10 Most Trusted Healthcare IT Security Solution Providers 2018
 

Viewers also liked

Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
Haystax Technology
 
Importance of pdhpe
Importance of pdhpeImportance of pdhpe
Importance of pdhpe
lolfeg
 
презентація опера
презентація операпрезентація опера
презентація операnikysja888
 
FINAL PR Portfolio Slides
FINAL PR Portfolio Slides FINAL PR Portfolio Slides
FINAL PR Portfolio Slides
Jaclyn Freedman
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016
SpondaPlc
 
American mfg
American mfgAmerican mfg
American mfg
francisco_cervantes
 
Why is learning about pdhpe importatnt
Why is learning about pdhpe importatntWhy is learning about pdhpe importatnt
Why is learning about pdhpe importatnt
dvella_94
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015
SpondaPlc
 
Drupal commerce
Drupal commerceDrupal commerce
Drupal commerce
Vasil Boychev
 
Literacy powerpointc
Literacy powerpointcLiteracy powerpointc
Literacy powerpointc
chantellemunro
 
Enterprise Threat Management
Enterprise Threat ManagementEnterprise Threat Management
Enterprise Threat Management
Haystax Technology
 
Historia 10 suurinta jackpottia
Historia 10 suurinta jackpottiaHistoria 10 suurinta jackpottia
Historia 10 suurinta jackpottia
CasinoLehti
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
Haystax Technology
 
StimulusWk13
StimulusWk13StimulusWk13
StimulusWk13
Aj Cruz
 
Comparatives and Superlatives
Comparatives and SuperlativesComparatives and Superlatives
Comparatives and Superlatives
Universidad Virtual Liverpool
 
Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515
SpondaPlc
 
Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk Assessment
Haystax Technology
 
Guía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodoGuía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodo
Zuleyner Moreno Córdoba
 
First class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26thFirst class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26th
Universidad Virtual Liverpool
 
Horror make up
Horror make upHorror make up
Horror make up
killer987
 

Viewers also liked (20)

Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
 
Importance of pdhpe
Importance of pdhpeImportance of pdhpe
Importance of pdhpe
 
презентація опера
презентація операпрезентація опера
презентація опера
 
FINAL PR Portfolio Slides
FINAL PR Portfolio Slides FINAL PR Portfolio Slides
FINAL PR Portfolio Slides
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016
 
American mfg
American mfgAmerican mfg
American mfg
 
Why is learning about pdhpe importatnt
Why is learning about pdhpe importatntWhy is learning about pdhpe importatnt
Why is learning about pdhpe importatnt
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015
 
Drupal commerce
Drupal commerceDrupal commerce
Drupal commerce
 
Literacy powerpointc
Literacy powerpointcLiteracy powerpointc
Literacy powerpointc
 
Enterprise Threat Management
Enterprise Threat ManagementEnterprise Threat Management
Enterprise Threat Management
 
Historia 10 suurinta jackpottia
Historia 10 suurinta jackpottiaHistoria 10 suurinta jackpottia
Historia 10 suurinta jackpottia
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
 
StimulusWk13
StimulusWk13StimulusWk13
StimulusWk13
 
Comparatives and Superlatives
Comparatives and SuperlativesComparatives and Superlatives
Comparatives and Superlatives
 
Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515
 
Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk Assessment
 
Guía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodoGuía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodo
 
First class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26thFirst class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26th
 
Horror make up
Horror make upHorror make up
Horror make up
 

Similar to Haystax carbon for Insider Threat Management & Continuous Evaluation

Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
Accenture Technology
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
Haystax Technology
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
ciso_insights
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Rachel Hamilton
 
Security from Compliance or Compliance from Security?--Metrics are the key
Security from Compliance or Compliance from Security?--Metrics are the keySecurity from Compliance or Compliance from Security?--Metrics are the key
Security from Compliance or Compliance from Security?--Metrics are the key
Alan Covell
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
Emma Kelly
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
Sirius
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
Deloitte Canada
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
Digital Guardian
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
Lumension
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
Compliancy Group
 
AI-Led-Cognitive-Data-Quality.pdf
AI-Led-Cognitive-Data-Quality.pdfAI-Led-Cognitive-Data-Quality.pdf
AI-Led-Cognitive-Data-Quality.pdf
arifulislam946965
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
Tarun Gupta,CRISC CISSP CISM CISA BCCE
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
World-Check One Brochure
World-Check One BrochureWorld-Check One Brochure
World-Check One Brochure
Michel El Maalouly
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
Nigel Robinson
 
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docxCRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
willcoxjanay
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lide
Recommind
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
Sharath Kumar
 

Similar to Haystax carbon for Insider Threat Management & Continuous Evaluation (20)

Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
Security from Compliance or Compliance from Security?--Metrics are the key
Security from Compliance or Compliance from Security?--Metrics are the keySecurity from Compliance or Compliance from Security?--Metrics are the key
Security from Compliance or Compliance from Security?--Metrics are the key
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
AI-Led-Cognitive-Data-Quality.pdf
AI-Led-Cognitive-Data-Quality.pdfAI-Led-Cognitive-Data-Quality.pdf
AI-Led-Cognitive-Data-Quality.pdf
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
World-Check One Brochure
World-Check One BrochureWorld-Check One Brochure
World-Check One Brochure
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docxCRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lide
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 

More from Haystax Technology

The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
Haystax Technology
 
School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
Haystax Technology
 
Major events
Major eventsMajor events
Major events
Haystax Technology
 
Public safety cloud overview
Public safety cloud overviewPublic safety cloud overview
Public safety cloud overview
Haystax Technology
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
Haystax Technology
 
Haystax bayesian networks
Haystax bayesian networksHaystax bayesian networks
Haystax bayesian networks
Haystax Technology
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paper
Haystax Technology
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...
Haystax Technology
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
Haystax Technology
 

More from Haystax Technology (9)

The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
 
School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
 
Major events
Major eventsMajor events
Major events
 
Public safety cloud overview
Public safety cloud overviewPublic safety cloud overview
Public safety cloud overview
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
 
Haystax bayesian networks
Haystax bayesian networksHaystax bayesian networks
Haystax bayesian networks
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paper
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Haystax carbon for Insider Threat Management & Continuous Evaluation

  • 1. Haystax Carbon for Enterprise Threat Management Actionable Intelligence for Decision Makers COMPANY PROPRIETARY INFORMATION
  • 2. Haystax Technology offers Advanced analytic solutions that provide real time actionable intelligence for complex, high consequence decisions COMPANY PROPRIETARY INFORMATION 1 About us
  • 3. Our heritage is in designing elegant solutions for complex problems not suited for traditional “brute force” analytic approaches We have multiple patents for our predictive models & algorithms DHS used our algorithms for risk based grant allocation Our analytics now drive the largest public safety ecosystem in the nation We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation COMPANY PROPRIETARY INFORMATION 2
  • 5. At the core of our Insider Threat management solution is our innovative, proven & efficient Carbon Risk Rating Platform Designed to leverage existing source data investments Designed to fit into existing investigation processes Includes the high performance Haystax Constellation Analytics Engine Designed to enable a wide range of mission optimized business applications Data can be easily handed off for post processing to other applications Investigative Case Construction 3rd Party Analytic Processors Haystax Carbon Risk Rating Continuous Evaluation Engine Carbon Whole Person Model Risk Dashboard Adjudicative Guideline Mapping Expert Assessments Continuous Data Collection Works with a wide range of data sources/types Background Check Peers & Family $ Financial Records HR Record Public Records Web and Social Media COMPANY PROPRIETARY INFORMATION 4
  • 6. Haystax Carbon is based on the understanding that Insider Threat Management is a prioritization problem Carbon Automated Evaluation Rotate from Service Or Exploit COMPANY PROPRIETARY INFORMATION 5 Continuous Data Experts & Guideline Compliance Backgroun d Check Peers & Family $ Collection Carbon Whole Person Model Carbon Prioritization Ranking Escalated Response Spend << Time Spend << $$ Financial Records Public Records HR Record Web and Social Media
  • 7. The Carbon Whole Person Model provides a single integrated view of an insider for dynamic trust Outside Work At Work Single Integrated View Public Records Employment Data (Current & History) Vehicle/Property Ownership Bank/Credit Records Criminal Records Family/Peer Comments Time In/Out Access Card Swipes Logins/Logouts Network Use Database/Data Store Access Printer User Telecom/Email Use Patterns of Use Continuous Evaluation Continuous Monitoring COMPANY PROPRIETARY INFORMATION 6
  • 8. Adjudicative Guidelines are mathematically modeled into Carbon to ensure policy compliance at all times Clearance-worthy Trustworthy Able to Indicativ e Mapping Risk Influence 13 Guidelines AC-f COMPANY PROPRIETARY INFORMATION 7 Enforces scoring results to compliance guidelines Enables scoring rules to adjust based on policy changes Improves transparency for risk rating results Disqualifying Conditions AC-a AC-b AC-c AC-d AC-e AC-g AC-h AL-a AL-b AL-c . . . Alcohol Consumption Allegiant to the United States Unsusceptible to coercion protect classified information Willing to protect classified Unsusceptible information to inducement
  • 9. ‘Qualitative’ expert knowledge augments existing data to align insider behavior to an organization’s specific threats IT Security HUMINT Psych Counterintelligence Medical Criminal Investigators Command Peers Family Subject SF86 $ Financial Records Public Records PAEI Carbon scales experts with algorithms Reflects knowledge of experts in the Carbon Whole Person Model Applies data about the subject to the Carbon Whole Person model Evaluates the model’s knowledge continuously as data or priorities change COMPANY PROPRIETARY INFORMATION 8
  • 10. Carbon is designed to make the results easy to understand for a wide range of end users COMPANY PROPRIETARY INFORMATION 9 Risk timeline, Alerts, dashboards, Summary level views and drill downs Compare subject to peer groups and historic changes in risk profile Insider Risk Rating Report Insider Pattern of life Timeline Insider Risk Dashboard
  • 11. The Carbon Risk Rating runs on the Haystax Constellation Analytic Platform The Constellation Analytics is optimized for high velocity and high volume data processing COMPANY PROPRIETARY INFORMATION 10 Data feeds Analytic Processors Carbon Model Natural Language Entity Resolution Geo Reasoning Association Analysis Scoring Actionable Intelligence through automated discovery, fusing and linking of information with out-of-the box visualizations Built with Open Source Flexible cloud deployment Built using multiple Haystax patents
  • 12. Carbon doesn’t just identify risk, but prioritizes it to enable an optimized Insider Threat management system Dynamic IDAM Escalated Response Rotate from Service Or Exploit Professional Observation / Intervention Non-Professional Observation / Intervention Escalated Review / Additional Data Spend << Time Spend << $$ Few People More People Expensive Data Enterprise Data Basic IT Controls Carbon can be easily integrated into existing Insider Threat Management Systems COMPANY PROPRIETARY INFORMATION 11
  • 13. The Carbon Risk Rating Platform can serve a wide range of applications E-Adjudication Automated Periodic Reviews Insider Threat Investigations Continuous Evaluation PTSD Suicide Prevention Workplace Violence COMPANY PROPRIETARY INFORMATION 12
  • 14. Carbon is designed to integrate into the overall enterprise security system – Cyber Example Log Management / Searching SIEM Threat Management Insider Threat Secure Cloud Gateway SSL Transfer COMPANY PROPRIETARY INFORMATION 13 Peer Network Peer Network Monitored Network Device Device OTX
  • 15. How is Carbon different from traditional Insider Threat detection & management? COMPANY PROPRIETARY INFORMATION 14
  • 16. The typical approach is to tackle Insider Threat as a signal to noise problem Traditional rules based systems rely on knowing ‘precisely’ what a target looks like Targ Miss False Alar m et Traditional rules based thresholds or flags will identify the obvious, but miss weak signals Lowering thresholds will dramatically increase false alarms, increase investigation time & cost, negatively impact continuous evaluation How do you strike a balance between false alarm rates & missed detections? COMPANY PROPRIETARY INFORMATION 15
  • 17. However, Insider Threat is not a classic signal to noise problem that rules based systems can negotiate well Targ et Miss False Alarms Our current systems rely on self-reporting and tips before an investigation can be launched Data is available to improve early detection, but complex rules based systems will generate high numbers of flags Unlike physical objects, people change so systems need to account for their “pattern of life”, Has financial problem? Has alcohol problem? Has work problems ? Has psychologic al problems? not static rules Approach was designed for manual operation on small, infrequent queries COMPANY PROPRIETARY INFORMATION 16
  • 18. The ACES Pilot for the DoD showed that traditional rules based approach are too efficient to be viable for large Data populations + Rules Based Detection Results Alarm s  3,370 reviewed  3,077 total flags identified  2,783 cases created  4 Significant Incident Reports  2 Imminent Threats FALSE POSITIVE RATE >20% At this false alarm rate, the USG would generate over 1,000 cases each day! Developed by psychologists over 15 years ago – the ideas are useful, but it is not a modern software system None of the ACES flags are prioritized or machine readable placing all of the burden on human analysts COMPANY PROPRIETARY INFORMATION 17
  • 19. The Target cyber fraud case is an example of the problem of sub-optimal alert prioritization COMPANY PROPRIETARY INFORMATION 18 Headlines make it appear that threat detection worked However, information needs to be actionable & prioritized Systems that generate too many false positives are a nuisance The analytic challenge is to scale the human element to connect-the-dots faster
  • 20. Haystax Carbon helps overcome the limitations of existing detection systems for Insider Threat management $ Continuous data collection HUMINT Trustworthy Able to Unsusceptible to coercion Unsusceptible to inducement Indicative Mapping Alcohol Consumption Willing to protect classified information Disqualifying conditions protect classified information AC-a AC-b AC-c AC-d AC-e AC-f AC-g AC-h AL-a AL-b AL-c . . . Allegiant to the United States Risk Influence 13 Guidelines Command Peers Rotate from Service Or Exploit Dynamic IDAM COMPANY PROPRIETARY INFORMATION 19 Carbon Whole Person Bayesian Model Mathematical configuration of adjudicative guidelines Few People Expensive Data Prioritization algorithm optimizes threat management Counterintelligence Medical Criminal Investigators Family Psych Subject IT Security SF86 Financial Records Public Records PAEI Expert judgments integrated into model Escalated Response Spend << Time Spend << $$ More People DoD Data Professional Observation / Intervention Non-Professional Observation / Intervention Escalated Review / Additional Data Basic IT Controls
  • 21. Haystax Carbon provides an analytic solution to Insider Threat detection & management that cannot be matched by traditional approaches Bayesian whole person model provides contextual analysis that rules-based systems cannot match for relevant results Model driven data ingest beats or matches brute force ‘big machine’ at a fraction of the cost Prioritization algorithm enables focusing investigative human resources on true high-risk individuals COMPANY PROPRIETARY INFORMATION 20
  • 22. Haystax: A new kind of Analytics Company We are mature enough to have proven technologies, but new enough to create cutting edge products and deliver one-of-a kind services to the national security community COMPANY PROPRIETARY INFORMATION 21
  • 23. Contact us: info@haystax.com Visit us: www.haystax.com 8251 Greensboro Drive, Suite 1111 McLean, VA 22012 COMPANY PROPRIETARY INFORMATION

Editor's Notes

  1. Our platform
  2. Say here, this approach cannot be fixed with more data and you cannot scale by adding people…
  3. ODNI 2012 Report on Security Clearance Determination – 4.9 total clearance holders.
  4. ODNI 2012 Report on Security Clearance Determination – 4.9 total clearance holders.
  5. Our delivery approach is an important aspect of who we are a company.