SlideShare a Scribd company logo
Title Text
Body Level One
• Body Level Two
• Body Level Three
• Body Level Four
• Body Level Five
Big Data : The Forgotten Security Landmine
By:
Lenin Aboagye, Security Executive
lenin@kogni.io
Where
01
What
02
How
03
AGENDA
02
Traditionally Data has been stored in File systems, Databases, Network Shares, Emails etc..
Most of the Data generated was structured data and stored in Databases
01
Where did we start from - and fast forward to today?
Today , App Developer Magazine reports that more data was created in 2017 than in the
previous 5,000 years of humanity, and Gartner estimates that nearly 80 percent of this data is
unstructured, meaning it lives in formats like PDFs, images and videos. The process of
managing, structuring and deriving value from this growing cache of information is challenging,
time-consuming and expensive — if it happens at all
• Paperless: Every organization is going Digital..
Grocery Chains, Digital Notary, Digital Banking,
Digital Lending Processes(scanning everything),
Esign(DocuSign)
• Ease of Content Creation : Social Media, Business
Apps
• Mobile Capture : Every second we capture and
send Data
• IOT: Connected anywhere and
everywhere(Thermostat, TV, Cars, Planes, Product
tracking etc..), Data Center Sensors
01
How and where is this Data coming from?
Media
Web
Cloud
IOT
Databases
01
Where is this data being stored and processed and why?
• Rapidly adopted technology, Capability
before Security
• Multiple sources of data, different Varieties
of data, Volume, Velocity
• No one really knows what data is being put
into big data lakes
• Security Governance Gaps..bulk of your
data is no longer in your databases
• There are not many security Data Scientist
and Data Scientist do not want to deal with
security
01 Why Important for business but security Forgotten?
Source: CA Study on big data
Data is harder to track now01
• No Natively Defined Security:
Encryption, Policy Management,
Compliance & Risk Management
• Anonymity and Privacy: User
identity, behaviors etc..
• Varied and Complex:
 Data structure: Structured, Semi-
Structured and Unstructured Data
 Sources: Server data, email data,
cloud apps and mobile device data
 Data consumers: High-level
executive, B2B, B2C
01
What is the GAP and how do we bridge it?
• Goldmine for PII
 Reams of data all flowing into
centralized system
• Few security people have big data
experience
• Data Brokers-e.g Cambridge
Analytica
• Current Security Solutions simply do
not work..DLP, Data Activity
Monitoring Tools, Database
Encryption
• Lack of products on market
01
What is the GAP and how do we bridge it?
• Extend best practices in structured Data to Big Data
• Know your Data: Data Discovery, Data Cataloging, reduce number of sensitive data locations
• Protect your Data: Encryption, Redaction, Tokenization, Authorization
• Monitor, Monitor, Monitor
• Watch out for Anomalies, User and System activity monitoring, Policy violations and build
predictive models with Big Data
• Build a data centric security and risk model
01 Solve the Big Data Conundrum
01
When it comes to Big Data
Thank you!!
THE WHY | DATA SECURITY01

More Related Content

What's hot

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
Risk Crew
 
Big data
Big dataBig data
Are You Innovating with Data?
Are You Innovating with Data?Are You Innovating with Data?
Are You Innovating with Data?
Brendan Aldrich
 
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
AugmentedWorldExpo
 
Real-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
Real-World Data Governance Webinar: Data Governance, Big Data, and the CloudReal-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
Real-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
DATAVERSITY
 
AWS IoT Innovators Event: Dirk Didascalou Presentation
AWS IoT Innovators Event: Dirk Didascalou PresentationAWS IoT Innovators Event: Dirk Didascalou Presentation
AWS IoT Innovators Event: Dirk Didascalou Presentation
Amazon Web Services
 
NoSQL? How about "NoDBMS"?
NoSQL? How about "NoDBMS"?NoSQL? How about "NoDBMS"?
NoSQL? How about "NoDBMS"?
DATAVERSITY
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
Barry Caplin
 
The Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI EvidenceThe Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI Evidence
Aaron Vick
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Nicholas Davis
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 
Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
BizLibrary
 
Webinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data ProtectionWebinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data Protection
Storage Switzerland
 
Data Governance and the Internet of Things
Data Governance and the Internet of ThingsData Governance and the Internet of Things
Data Governance and the Internet of Things
DATAVERSITY
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
Potato
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
risksmith
 
NDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTNDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoT
Justin Grammens
 
How Is IoT Changing Web Development?
How Is IoT Changing Web Development?How Is IoT Changing Web Development?
How Is IoT Changing Web Development?
Cloud Analogy
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
Data Security
 

What's hot (19)

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Big data
Big dataBig data
Big data
 
Are You Innovating with Data?
Are You Innovating with Data?Are You Innovating with Data?
Are You Innovating with Data?
 
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
 
Real-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
Real-World Data Governance Webinar: Data Governance, Big Data, and the CloudReal-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
Real-World Data Governance Webinar: Data Governance, Big Data, and the Cloud
 
AWS IoT Innovators Event: Dirk Didascalou Presentation
AWS IoT Innovators Event: Dirk Didascalou PresentationAWS IoT Innovators Event: Dirk Didascalou Presentation
AWS IoT Innovators Event: Dirk Didascalou Presentation
 
NoSQL? How about "NoDBMS"?
NoSQL? How about "NoDBMS"?NoSQL? How about "NoDBMS"?
NoSQL? How about "NoDBMS"?
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
The Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI EvidenceThe Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI Evidence
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
 
Webinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data ProtectionWebinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data Protection
 
Data Governance and the Internet of Things
Data Governance and the Internet of ThingsData Governance and the Internet of Things
Data Governance and the Internet of Things
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
NDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTNDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoT
 
How Is IoT Changing Web Development?
How Is IoT Changing Web Development?How Is IoT Changing Web Development?
How Is IoT Changing Web Development?
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 

Similar to Isc(2) eastbay-lenin aboagye

Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
Cloudera, Inc.
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
Stephen Cobb
 
A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making
Ridi Fe
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
Everteam
 
Winning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscapeWinning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscape
Avinash Ramineni
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
Castlebridge Associates
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Gary Dodson
 
Tackling data security
Tackling data securityTackling data security
Tackling data security
Peter Bassill
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
Edge Pereira
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Edge Pereira
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Edge Pereira
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Gabor Szathmari
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
Dez Blanchfield
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Concept Searching, Inc
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io
 
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance WebinarEnough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Concept Searching, Inc
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Druva
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Zia Consulting
 
Meeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldMeeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand World
Hostway|HOSTING
 

Similar to Isc(2) eastbay-lenin aboagye (20)

Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Winning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscapeWinning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscape
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Tackling data security
Tackling data securityTackling data security
Tackling data security
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance WebinarEnough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
Meeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldMeeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand World
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Isc(2) eastbay-lenin aboagye

  • 1. Title Text Body Level One • Body Level Two • Body Level Three • Body Level Four • Body Level Five Big Data : The Forgotten Security Landmine By: Lenin Aboagye, Security Executive lenin@kogni.io
  • 3. Traditionally Data has been stored in File systems, Databases, Network Shares, Emails etc.. Most of the Data generated was structured data and stored in Databases 01 Where did we start from - and fast forward to today? Today , App Developer Magazine reports that more data was created in 2017 than in the previous 5,000 years of humanity, and Gartner estimates that nearly 80 percent of this data is unstructured, meaning it lives in formats like PDFs, images and videos. The process of managing, structuring and deriving value from this growing cache of information is challenging, time-consuming and expensive — if it happens at all
  • 4. • Paperless: Every organization is going Digital.. Grocery Chains, Digital Notary, Digital Banking, Digital Lending Processes(scanning everything), Esign(DocuSign) • Ease of Content Creation : Social Media, Business Apps • Mobile Capture : Every second we capture and send Data • IOT: Connected anywhere and everywhere(Thermostat, TV, Cars, Planes, Product tracking etc..), Data Center Sensors 01 How and where is this Data coming from? Media Web Cloud IOT Databases
  • 5. 01 Where is this data being stored and processed and why?
  • 6. • Rapidly adopted technology, Capability before Security • Multiple sources of data, different Varieties of data, Volume, Velocity • No one really knows what data is being put into big data lakes • Security Governance Gaps..bulk of your data is no longer in your databases • There are not many security Data Scientist and Data Scientist do not want to deal with security 01 Why Important for business but security Forgotten? Source: CA Study on big data
  • 7. Data is harder to track now01
  • 8. • No Natively Defined Security: Encryption, Policy Management, Compliance & Risk Management • Anonymity and Privacy: User identity, behaviors etc.. • Varied and Complex:  Data structure: Structured, Semi- Structured and Unstructured Data  Sources: Server data, email data, cloud apps and mobile device data  Data consumers: High-level executive, B2B, B2C 01 What is the GAP and how do we bridge it? • Goldmine for PII  Reams of data all flowing into centralized system • Few security people have big data experience • Data Brokers-e.g Cambridge Analytica • Current Security Solutions simply do not work..DLP, Data Activity Monitoring Tools, Database Encryption • Lack of products on market
  • 9. 01 What is the GAP and how do we bridge it?
  • 10. • Extend best practices in structured Data to Big Data • Know your Data: Data Discovery, Data Cataloging, reduce number of sensitive data locations • Protect your Data: Encryption, Redaction, Tokenization, Authorization • Monitor, Monitor, Monitor • Watch out for Anomalies, User and System activity monitoring, Policy violations and build predictive models with Big Data • Build a data centric security and risk model 01 Solve the Big Data Conundrum
  • 11. 01 When it comes to Big Data
  • 12. Thank you!! THE WHY | DATA SECURITY01

Editor's Notes

  1. Databases: Traditional and modern databases(MSSQL, NOSQL) IOT: Data from Interconnected devices Web: Data publicly available on web, social media ,etc.. Cloud: Public, Private Media: Images, Videos, Social Media, Audio, podcasts
  2. Databases: Traditional and modern databases(MSSQL, NOSQL) IOT: Data from Interconnected devices Web: Data publicly available on web, social media ,etc.. Cloud: Public, Private Media: Images, Videos, Social Media, Audio, podcasts
  3. http://www.datacenterknowledge.com/archives/2015/06/16/study-identifies-common-pain-points-in-big-data-projects
  4. https://www.privacyrights.org/data-breaches?title=&taxonomy_vocabulary_11_tid%5B%5D=2436&taxonomy_vocabulary_11_tid%5B%5D=2434\ https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-static/ GDPR regulation is a way government is forcing the organizations to do the right thing Very soon we will be seeing similar regulations coming up in US
  5. Cambridge Analytica..23 million, 83 million
  6. Databases: Traditional and modern databases(MSSQL, NOSQL) IOT: Data from Interconnected devices Web: Data publicly available on web, social media ,etc.. Cloud: Public, Private Media: Images, Videos, Social Media, Audio, podcasts
  7. there is no insitituinal kbowkedge of what data is stored in a datastore…equifax and scotttrade breach example… you do not not where your sensitive data is stored [notes, image, chat text, app logs] the answer keeps changing you do not not who has access to your sensitive data [temp tables with wide-open access, text data with wide-open access] the answer keeps changing since the answer keeps changing you need an alerting system, not merely a reporting system As big data gets bigger and cloud usage increases, governing sensitive data and managing digital risk at an enterprise level are daunting challenges. Non-production databases are a goldmine of sensitive data and are regularly used in application development and testing. Too many data sources [prod, dev, qa] [on-premises, cloud] [file serves, nosql, hadoop, rdbms] [image, text, csv] can get overwhelmed by the sheer number of data sources that need to be monitored examples text doctor's notes has patient's sensitive data (PHI) [Healthcare] counselor notes has student's sensitive data (FERPA) [Education] rep's notes has customer's credit card number (PCI) [E-Commerce and Retail] chat text has customer's sensitive data developer is writing SSN, credit card, to a log file. How do you know he is not? a temporary table containing sensitive data gets created [dev forgets to delete it] [wide-open access]