SlideShare a Scribd company logo
2019 HPCC
Systems®
Community Day
Challenge Yourself –
Challenge the Status Quo
Andy Bayer
Sr Dir, Program
Mgt
IADP / RELX
Mohammed Naweed
Consulting Software
Engineer
LexisNexis Risk Solutions
Marcus Mullins
Security Eng. Mgr.
IADP / RELX
Leveraging HPCC Systems as Part of an Information Security,
Privacy, and Compliance Framework
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
2
Agenda
 Overview of IADP
 Operational Considerations
 HPCC Systems Project Detail
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
3
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
4
The RELX Group Information Assurance and Data Protection organization (IADP) provides oversight of
privacy, security and compliance practices as part of the company’s comprehensive risk mitigation
program, with a focus on protecting PII and SPII data available via LexisNexis online products. Key
functions include:
Overview of IADP
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
5
The RELX Group Information Assurance and Data Protection organization (IADP) provides oversight of
privacy, security and compliance practices as part of the company’s comprehensive risk mitigation
program, with a focus on protecting PII and SPII data available via LexisNexis online products. Key
functions include:
Overview of IADP
Fraud
Detection
Mitigate risk by detecting anomalous activity
that may be an indication of fraudulent
behavior
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
6
The RELX Group Information Assurance and Data Protection organization (IADP) provides oversight of
privacy, security and compliance practices as part of the company’s comprehensive risk mitigation
program, with a focus on protecting PII and SPII data available via LexisNexis online products. Key
functions include:
Overview of IADP
Fraud
Detection
Investigations & Incident
Response
Mitigate risk by detecting anomalous activity
that may be an indication of fraudulent
behavior
Conduct data security investigations and
respond to incidents utilizing various tools in
accordance with established processes
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
7
Comply with regulatory requirements,
applicable laws, data provider restrictions, and
internal policies
Ongoing Compliance
Mitigate risk by detecting anomalous activity
that may be an indication of fraudulent
behavior
Fraud
Detection
Conduct data security investigations and
respond to incidents utilizing various tools in
accordance with established processes
Investigations & Incident
Response
The RELX Group Information Assurance and Data Protection organization (IADP) provides oversight of
privacy, security and compliance practices as part of the company’s comprehensive risk mitigation
program, with a focus on protecting PII and SPII data available via LexisNexis online products. Key
functions include:
Overview of IADP
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
8
Overview of IADP
To meet the objectives of the IADP, the three key functions must rely on the collection and retention of
relevant data from numerous online product repositories across the business, including:
 Customer account metadata
 Administrative activity logs
 Product authentication logs
 Transaction logs
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
9
The fraud detection system processes
user activity records throughout every
day to identify anomalous activity by
utilizing rules-based criteria, including:
- Geo Location
- Time Stamp
- Industry
- Authentication Method
- Search Type
- Search Velocity
- Search Volume
and
- Previous User Activity
Overview of IADP
Fraud
Detection
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
10
Trained investigators follow a
documented investigative process to
respond to raised alerts. Steps in the
investigation process include:
- User search records are logged and
maintained and exception activity
reports are appropriately reviewed and
investigated, as necessary.
- Security incidents are responded to in
accordance with the Investigation
Process
Investigations & Incident
Response
Overview of IADP
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
11
The process collects appropriate
searches that are then sent to the
customer to verify that selected searches
were authorized, conducted for
legitimate business purposes, and in
accordance with legal and regulatory
requirements.
These include random audits, event-
driven audits, and audits in which
customers conduct searches on high
profile individuals.
Ongoing Compliance
Overview of IADP
Overview of IADP
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
12
For the IADP to respond more appropriately to the current and future environment, we need to adapt, grow, and capitalize on
all data and analysis available, using new technology to its full advantage.
Continuous
Improvement
Overview of IADP
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
13
For the IADP to respond more appropriately to the current and future environment, we need to adapt, grow, and capitalize on
all data and analysis available, using new technology to its full advantage.
Continuous
Improvement
Effectiveness: are we monitoring, alerting and auditing on the right things
 Data is complete and accurate
 Sufficient coverage of high risk applications and markets
 Improve accuracy of fraud detection parameters: more on-point hits; reduction of false positives
Going forward:
 Emphasis on behavioral vs location and time-based analytics
 Shift toward data modeling instead of reactive response
Overview of IADP
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
14
For the IADP to respond more appropriately to the current and future environment, we need to adapt, grow, and capitalize on
all data and analysis available, using new technology to its full advantage.
Continuous
Improvement
Effectiveness: are we monitoring, alerting and auditing on the right things
 Data is complete and accurate
 Sufficient coverage of high risk applications and markets
 Improve accuracy of fraud detection parameters: more on-point hits; reduction of false positives
Going forward:
 Emphasis on behavioral vs location and time-based analytics
 Shift toward data modeling instead of reactive response
Efficiency: do we identify suspicious activity and respond quickly and accurately
 Automate processes so that critical tasks can be completed quickly and easily
 Notifications of potentially high risk incidents are given special attention
 Information and data necessary to complete investigations and audits is readily available
Going forward
 Increased use of visualization and analytical tools
 Improved workflow integration
Data Ingestion
Operational Considerations – Workflow Integration
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
15
Landing
Zone
ProductsCustome
r
HPCC
Systems
Cluster
Reporting
Tools
IADP
User
Report Queries
Operational Considerations – Workflow Integration
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
16
Landing
Zone
ProductsCustome
r
HPCC
Systems
Cluster
Reporting
Tools
IADP
User
Process State Tracking
Operational Considerations – Workflow Integration
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
17
Landing
Zone
ProductsCustome
r
HPCC
Systems
Cluster
Reporting
Tools
IADP
User
MySQL
Process State Tracking
Operational Considerations – Workflow Integration
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
18
Landing
Zone
ProductsCustome
r
HPCC
Systems
Cluster
Reporting
Tools
IADP
User
MySQL
Dashboar
d
IADP
Operation
s
Operational Considerations – Data Management
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
19
Landing Zone Space
Management
HPCC Systems Landing Zone
Truncation
Process
Operational Considerations – Data Management
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
20
Data Normalization
HPCC Systems Cluster
Fnam
e
First Name
Lnam
e
Last Name
BillCode
Company
No
FirstNam
e
LastNam
eAccountI
D
Normalization
Process
Operational Considerations – Data Management
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
21
Record Versioning
HPCC Systems Cluster
UserID:
JSmith1Phone:
9375551234
UserID:
JSmith1Phone:
6145550077
Date: 3/5/2018
Date: 1/23/2019
UserID:
JSmith1Phone:
5135559000Date: 12/2/2017
Version: 1
Version: 2
Version: 3
Record Update
Process
Operational Considerations – Data Management
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
22
Data Truncation
HPCC Systems Cluster
Truncation
Process
User Authentication/Authorization
Operational Considerations – Security
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
23
HPCC
Systems
Cluster
Reporting
Tools
IADP
User
Active
Directory
IADP
Operation
s
Other
Systems
Encryption
Operational Considerations – Security
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
24
HPCC
Systems
Cluster
Reporting
Tools
IADP
User
Active
Directory
IADP
Operation
s
Other
Systems
Project Requirements
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
25
Check Every User Event for Fraud as soon as it is created.
Create and Deliver the Reports requested by Investigators in the
Shortest time Possible.
Project Requirements
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
26
Process more than 30M records per day
Data from more than 60 Data Sources
Meta Data, Look up Data and IP Geo Location Data
Create Reports based on Investigators Search Requests
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
27
Application Architecture
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 28
HPCC Systems
Data Ingestion
Fraud Detection/Alerts
Advanced Search/Reporting
IADP Web
Application
Elastic Search
My SQL
Reports Repository
Meta Data
IP Geo
Location Data
Authentication
Transaction
Logs
Data Processing
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
29
Meta Data
Data Processing
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
30
IP Geo
Location Data
Meta Data
Data Processing
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
31
Data
Validation
Data
Formatting
Data
Enhancement
Fraud CheckBuild Indexes
Index’s
Query
Processor
IP Geo
Location Data
Meta Data
User
Action
Logs
Web
Application
Elastic Search
My SQL
HPCC Systems – Cluster Architecture
32
IADP
Data
Meta Data
IP Geo Location
Transaction Logs
ECL
Programming
Language
Thor Q1
Data Ingestion/Fraud
Detection
Thor Q2
Query
processing/Report
Creation
Query
Visualize
Connect
Query
Processing
Data
Processing
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework
Conclusions
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance
Framework
33
Time taken to check every user event for fraud is reduced from hours to minutes
Faster Report Creation
New, more complex Queries
More exhaustive Fraud detection
View this presentation on YouTube:
https://www.youtube.com/watch?v=O-qJwxhQTzA&list=PL-
8MJMUpp8IKH5-d56az56t52YccleX5h&index=2&t=18s
Starts at: 52:25
Leveraging HPCC Systems as Part of an Information Security,
Privacy, and Compliance Framework
34

More Related Content

What's hot

Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
ControlCase
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
data brackets
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
ControlCase
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
mindleaftechnologies
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
➲ Stella Bridges
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
Flaskdata.io
 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbiz
shailu devi
 
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST CertificationHitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
Schellman & Company
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
PYA, P.C.
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
ControlCase
 
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin, Inc.
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
Charles McNeil
 
Get Ready Now for HITRUST 2017
Get Ready Now for HITRUST 2017Get Ready Now for HITRUST 2017
Get Ready Now for HITRUST 2017
Schellman & Company
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
MBMeHealthCareSolutions
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
ControlCase
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
Sridhar Karnam
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
Evan Francen
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
ControlCase
 
Cisa 2013 ch4
Cisa 2013 ch4Cisa 2013 ch4
Cisa 2013 ch4
Aladdin Dandis
 

What's hot (20)

Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbiz
 
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST CertificationHitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
 
Get Ready Now for HITRUST 2017
Get Ready Now for HITRUST 2017Get Ready Now for HITRUST 2017
Get Ready Now for HITRUST 2017
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
Cisa 2013 ch4
Cisa 2013 ch4Cisa 2013 ch4
Cisa 2013 ch4
 

Similar to Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework

{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Taiye Lambo
 
Time to re think our security process
Time to re think our security processTime to re think our security process
Time to re think our security process
Ulf Mattsson
 
Nasrhuma Inc Grc Solutions 011010
Nasrhuma Inc Grc Solutions 011010Nasrhuma Inc Grc Solutions 011010
Nasrhuma Inc Grc Solutions 011010
Nasser J Khan
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
Lumension
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
SAP Ariba
 
Rosetta Stone x Compliance ONETRUST-1.pdf
Rosetta Stone x Compliance ONETRUST-1.pdfRosetta Stone x Compliance ONETRUST-1.pdf
Rosetta Stone x Compliance ONETRUST-1.pdf
rossinial
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
awish11
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
SteveAtHPE
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
Sridhar Karnam
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
SAP Ariba
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
DVV Solutions Third Party Risk Management
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Sonatype
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_study
Rob Johnston, MBA
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
D. Scott Clark
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
PECB
 
Coyle Chapter 6 PowerPoint Slides.ppt
Coyle Chapter 6 PowerPoint Slides.pptCoyle Chapter 6 PowerPoint Slides.ppt
Coyle Chapter 6 PowerPoint Slides.ppt
MurugesanJeyakumar1
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
NowSecure
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 

Similar to Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework (20)

{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Time to re think our security process
Time to re think our security processTime to re think our security process
Time to re think our security process
 
Nasrhuma Inc Grc Solutions 011010
Nasrhuma Inc Grc Solutions 011010Nasrhuma Inc Grc Solutions 011010
Nasrhuma Inc Grc Solutions 011010
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Rosetta Stone x Compliance ONETRUST-1.pdf
Rosetta Stone x Compliance ONETRUST-1.pdfRosetta Stone x Compliance ONETRUST-1.pdf
Rosetta Stone x Compliance ONETRUST-1.pdf
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_study
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
Coyle Chapter 6 PowerPoint Slides.ppt
Coyle Chapter 6 PowerPoint Slides.pptCoyle Chapter 6 PowerPoint Slides.ppt
Coyle Chapter 6 PowerPoint Slides.ppt
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 

More from HPCC Systems

Natural Language to SQL Query conversion using Machine Learning Techniques on...
Natural Language to SQL Query conversion using Machine Learning Techniques on...Natural Language to SQL Query conversion using Machine Learning Techniques on...
Natural Language to SQL Query conversion using Machine Learning Techniques on...
HPCC Systems
 
Improving Efficiency of Machine Learning Algorithms using HPCC Systems
Improving Efficiency of Machine Learning Algorithms using HPCC SystemsImproving Efficiency of Machine Learning Algorithms using HPCC Systems
Improving Efficiency of Machine Learning Algorithms using HPCC Systems
HPCC Systems
 
Towards Trustable AI for Complex Systems
Towards Trustable AI for Complex SystemsTowards Trustable AI for Complex Systems
Towards Trustable AI for Complex Systems
HPCC Systems
 
Welcome
WelcomeWelcome
Welcome
HPCC Systems
 
Closing / Adjourn
Closing / Adjourn Closing / Adjourn
Closing / Adjourn
HPCC Systems
 
Community Website: Virtual Ribbon Cutting
Community Website: Virtual Ribbon CuttingCommunity Website: Virtual Ribbon Cutting
Community Website: Virtual Ribbon Cutting
HPCC Systems
 
Path to 8.0
Path to 8.0 Path to 8.0
Path to 8.0
HPCC Systems
 
Release Cycle Changes
Release Cycle ChangesRelease Cycle Changes
Release Cycle Changes
HPCC Systems
 
Geohashing with Uber’s H3 Geospatial Index
Geohashing with Uber’s H3 Geospatial Index Geohashing with Uber’s H3 Geospatial Index
Geohashing with Uber’s H3 Geospatial Index
HPCC Systems
 
Advancements in HPCC Systems Machine Learning
Advancements in HPCC Systems Machine LearningAdvancements in HPCC Systems Machine Learning
Advancements in HPCC Systems Machine Learning
HPCC Systems
 
Docker Support
Docker Support Docker Support
Docker Support
HPCC Systems
 
Expanding HPCC Systems Deep Neural Network Capabilities
Expanding HPCC Systems Deep Neural Network CapabilitiesExpanding HPCC Systems Deep Neural Network Capabilities
Expanding HPCC Systems Deep Neural Network Capabilities
HPCC Systems
 
Leveraging Intra-Node Parallelization in HPCC Systems
Leveraging Intra-Node Parallelization in HPCC SystemsLeveraging Intra-Node Parallelization in HPCC Systems
Leveraging Intra-Node Parallelization in HPCC Systems
HPCC Systems
 
DataPatterns - Profiling in ECL Watch
DataPatterns - Profiling in ECL Watch DataPatterns - Profiling in ECL Watch
DataPatterns - Profiling in ECL Watch
HPCC Systems
 
Leveraging the Spark-HPCC Ecosystem
Leveraging the Spark-HPCC Ecosystem Leveraging the Spark-HPCC Ecosystem
Leveraging the Spark-HPCC Ecosystem
HPCC Systems
 
Work Unit Analysis Tool
Work Unit Analysis ToolWork Unit Analysis Tool
Work Unit Analysis Tool
HPCC Systems
 
Community Award Ceremony
Community Award Ceremony Community Award Ceremony
Community Award Ceremony
HPCC Systems
 
Dapper Tool - A Bundle to Make your ECL Neater
Dapper Tool - A Bundle to Make your ECL NeaterDapper Tool - A Bundle to Make your ECL Neater
Dapper Tool - A Bundle to Make your ECL Neater
HPCC Systems
 
A Success Story of Challenging the Status Quo: Gadget Girls and the Inclusion...
A Success Story of Challenging the Status Quo: Gadget Girls and the Inclusion...A Success Story of Challenging the Status Quo: Gadget Girls and the Inclusion...
A Success Story of Challenging the Status Quo: Gadget Girls and the Inclusion...
HPCC Systems
 
Beyond the Spectrum – Creating an Environment of Diversity and Empowerment wi...
Beyond the Spectrum – Creating an Environment of Diversity and Empowerment wi...Beyond the Spectrum – Creating an Environment of Diversity and Empowerment wi...
Beyond the Spectrum – Creating an Environment of Diversity and Empowerment wi...
HPCC Systems
 

More from HPCC Systems (20)

Natural Language to SQL Query conversion using Machine Learning Techniques on...
Natural Language to SQL Query conversion using Machine Learning Techniques on...Natural Language to SQL Query conversion using Machine Learning Techniques on...
Natural Language to SQL Query conversion using Machine Learning Techniques on...
 
Improving Efficiency of Machine Learning Algorithms using HPCC Systems
Improving Efficiency of Machine Learning Algorithms using HPCC SystemsImproving Efficiency of Machine Learning Algorithms using HPCC Systems
Improving Efficiency of Machine Learning Algorithms using HPCC Systems
 
Towards Trustable AI for Complex Systems
Towards Trustable AI for Complex SystemsTowards Trustable AI for Complex Systems
Towards Trustable AI for Complex Systems
 
Welcome
WelcomeWelcome
Welcome
 
Closing / Adjourn
Closing / Adjourn Closing / Adjourn
Closing / Adjourn
 
Community Website: Virtual Ribbon Cutting
Community Website: Virtual Ribbon CuttingCommunity Website: Virtual Ribbon Cutting
Community Website: Virtual Ribbon Cutting
 
Path to 8.0
Path to 8.0 Path to 8.0
Path to 8.0
 
Release Cycle Changes
Release Cycle ChangesRelease Cycle Changes
Release Cycle Changes
 
Geohashing with Uber’s H3 Geospatial Index
Geohashing with Uber’s H3 Geospatial Index Geohashing with Uber’s H3 Geospatial Index
Geohashing with Uber’s H3 Geospatial Index
 
Advancements in HPCC Systems Machine Learning
Advancements in HPCC Systems Machine LearningAdvancements in HPCC Systems Machine Learning
Advancements in HPCC Systems Machine Learning
 
Docker Support
Docker Support Docker Support
Docker Support
 
Expanding HPCC Systems Deep Neural Network Capabilities
Expanding HPCC Systems Deep Neural Network CapabilitiesExpanding HPCC Systems Deep Neural Network Capabilities
Expanding HPCC Systems Deep Neural Network Capabilities
 
Leveraging Intra-Node Parallelization in HPCC Systems
Leveraging Intra-Node Parallelization in HPCC SystemsLeveraging Intra-Node Parallelization in HPCC Systems
Leveraging Intra-Node Parallelization in HPCC Systems
 
DataPatterns - Profiling in ECL Watch
DataPatterns - Profiling in ECL Watch DataPatterns - Profiling in ECL Watch
DataPatterns - Profiling in ECL Watch
 
Leveraging the Spark-HPCC Ecosystem
Leveraging the Spark-HPCC Ecosystem Leveraging the Spark-HPCC Ecosystem
Leveraging the Spark-HPCC Ecosystem
 
Work Unit Analysis Tool
Work Unit Analysis ToolWork Unit Analysis Tool
Work Unit Analysis Tool
 
Community Award Ceremony
Community Award Ceremony Community Award Ceremony
Community Award Ceremony
 
Dapper Tool - A Bundle to Make your ECL Neater
Dapper Tool - A Bundle to Make your ECL NeaterDapper Tool - A Bundle to Make your ECL Neater
Dapper Tool - A Bundle to Make your ECL Neater
 
A Success Story of Challenging the Status Quo: Gadget Girls and the Inclusion...
A Success Story of Challenging the Status Quo: Gadget Girls and the Inclusion...A Success Story of Challenging the Status Quo: Gadget Girls and the Inclusion...
A Success Story of Challenging the Status Quo: Gadget Girls and the Inclusion...
 
Beyond the Spectrum – Creating an Environment of Diversity and Empowerment wi...
Beyond the Spectrum – Creating an Environment of Diversity and Empowerment wi...Beyond the Spectrum – Creating an Environment of Diversity and Empowerment wi...
Beyond the Spectrum – Creating an Environment of Diversity and Empowerment wi...
 

Recently uploaded

the unexpected potential of Dijkstra's Algorithm
the unexpected potential of Dijkstra's Algorithmthe unexpected potential of Dijkstra's Algorithm
the unexpected potential of Dijkstra's Algorithm
huseindihon
 
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
kuldeepsharmaks8120
 
Verified Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servic...
Verified Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servic...Verified Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servic...
Verified Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servic...
revolutionary575
 
Welcome back to Instagram. Sign in to check out what your
Welcome back to Instagram. Sign in to check out what yourWelcome back to Instagram. Sign in to check out what your
Welcome back to Instagram. Sign in to check out what your
Virni Arrora
 
Research proposal seminar ,Research Methodology
Research proposal seminar ,Research MethodologyResearch proposal seminar ,Research Methodology
Research proposal seminar ,Research Methodology
doctorzlife786
 
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
saadkhan1485265
 
Fine-Tuning of Small/Medium LLMs for Business QA on Structured Data
Fine-Tuning of Small/Medium LLMs for Business QA on Structured DataFine-Tuning of Small/Medium LLMs for Business QA on Structured Data
Fine-Tuning of Small/Medium LLMs for Business QA on Structured Data
kevig
 
Harendra Singh, AI Strategy and Consulting Portfolio
Harendra Singh, AI Strategy and Consulting PortfolioHarendra Singh, AI Strategy and Consulting Portfolio
Harendra Singh, AI Strategy and Consulting Portfolio
harendmgr
 
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
tanupasswan6
 
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
janvikumar4133
 
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
birajmohan012
 
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
vrvipin164
 
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
tanupasswan6
 
🚂🚘 Premium Girls Call Bangalore 🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
🚂🚘 Premium Girls Call Bangalore  🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...🚂🚘 Premium Girls Call Bangalore  🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
🚂🚘 Premium Girls Call Bangalore 🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
bhupeshkumar0889
 
Celonis Busniess Analyst Virtual Internship.pptx
Celonis Busniess Analyst Virtual Internship.pptxCelonis Busniess Analyst Virtual Internship.pptx
Celonis Busniess Analyst Virtual Internship.pptx
AnujaGaikwad28
 
DataScienceConcept_Kanchana_Weerasinghe.pptx
DataScienceConcept_Kanchana_Weerasinghe.pptxDataScienceConcept_Kanchana_Weerasinghe.pptx
DataScienceConcept_Kanchana_Weerasinghe.pptx
Kanchana Weerasinghe
 
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
ginni singh$A17
 
all about the data science process, covering the steps present in almost ever...
all about the data science process, covering the steps present in almost ever...all about the data science process, covering the steps present in almost ever...
all about the data science process, covering the steps present in almost ever...
palaniappancse
 
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
gargnatasha985
 
Female Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service A...
Female Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service A...Female Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service A...
Female Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service A...
45unexpected
 

Recently uploaded (20)

the unexpected potential of Dijkstra's Algorithm
the unexpected potential of Dijkstra's Algorithmthe unexpected potential of Dijkstra's Algorithm
the unexpected potential of Dijkstra's Algorithm
 
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
 
Verified Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servic...
Verified Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servic...Verified Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servic...
Verified Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servic...
 
Welcome back to Instagram. Sign in to check out what your
Welcome back to Instagram. Sign in to check out what yourWelcome back to Instagram. Sign in to check out what your
Welcome back to Instagram. Sign in to check out what your
 
Research proposal seminar ,Research Methodology
Research proposal seminar ,Research MethodologyResearch proposal seminar ,Research Methodology
Research proposal seminar ,Research Methodology
 
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
 
Fine-Tuning of Small/Medium LLMs for Business QA on Structured Data
Fine-Tuning of Small/Medium LLMs for Business QA on Structured DataFine-Tuning of Small/Medium LLMs for Business QA on Structured Data
Fine-Tuning of Small/Medium LLMs for Business QA on Structured Data
 
Harendra Singh, AI Strategy and Consulting Portfolio
Harendra Singh, AI Strategy and Consulting PortfolioHarendra Singh, AI Strategy and Consulting Portfolio
Harendra Singh, AI Strategy and Consulting Portfolio
 
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
 
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
 
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
 
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
 
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
 
🚂🚘 Premium Girls Call Bangalore 🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
🚂🚘 Premium Girls Call Bangalore  🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...🚂🚘 Premium Girls Call Bangalore  🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
🚂🚘 Premium Girls Call Bangalore 🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
 
Celonis Busniess Analyst Virtual Internship.pptx
Celonis Busniess Analyst Virtual Internship.pptxCelonis Busniess Analyst Virtual Internship.pptx
Celonis Busniess Analyst Virtual Internship.pptx
 
DataScienceConcept_Kanchana_Weerasinghe.pptx
DataScienceConcept_Kanchana_Weerasinghe.pptxDataScienceConcept_Kanchana_Weerasinghe.pptx
DataScienceConcept_Kanchana_Weerasinghe.pptx
 
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
 
all about the data science process, covering the steps present in almost ever...
all about the data science process, covering the steps present in almost ever...all about the data science process, covering the steps present in almost ever...
all about the data science process, covering the steps present in almost ever...
 
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
 
Female Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service A...
Female Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service A...Female Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service A...
Female Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service A...
 

Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework

  • 1. 2019 HPCC Systems® Community Day Challenge Yourself – Challenge the Status Quo Andy Bayer Sr Dir, Program Mgt IADP / RELX Mohammed Naweed Consulting Software Engineer LexisNexis Risk Solutions Marcus Mullins Security Eng. Mgr. IADP / RELX
  • 2. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 2
  • 3. Agenda  Overview of IADP  Operational Considerations  HPCC Systems Project Detail Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 3
  • 4. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 4 The RELX Group Information Assurance and Data Protection organization (IADP) provides oversight of privacy, security and compliance practices as part of the company’s comprehensive risk mitigation program, with a focus on protecting PII and SPII data available via LexisNexis online products. Key functions include: Overview of IADP
  • 5. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 5 The RELX Group Information Assurance and Data Protection organization (IADP) provides oversight of privacy, security and compliance practices as part of the company’s comprehensive risk mitigation program, with a focus on protecting PII and SPII data available via LexisNexis online products. Key functions include: Overview of IADP Fraud Detection Mitigate risk by detecting anomalous activity that may be an indication of fraudulent behavior
  • 6. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 6 The RELX Group Information Assurance and Data Protection organization (IADP) provides oversight of privacy, security and compliance practices as part of the company’s comprehensive risk mitigation program, with a focus on protecting PII and SPII data available via LexisNexis online products. Key functions include: Overview of IADP Fraud Detection Investigations & Incident Response Mitigate risk by detecting anomalous activity that may be an indication of fraudulent behavior Conduct data security investigations and respond to incidents utilizing various tools in accordance with established processes
  • 7. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 7 Comply with regulatory requirements, applicable laws, data provider restrictions, and internal policies Ongoing Compliance Mitigate risk by detecting anomalous activity that may be an indication of fraudulent behavior Fraud Detection Conduct data security investigations and respond to incidents utilizing various tools in accordance with established processes Investigations & Incident Response The RELX Group Information Assurance and Data Protection organization (IADP) provides oversight of privacy, security and compliance practices as part of the company’s comprehensive risk mitigation program, with a focus on protecting PII and SPII data available via LexisNexis online products. Key functions include: Overview of IADP
  • 8. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 8 Overview of IADP To meet the objectives of the IADP, the three key functions must rely on the collection and retention of relevant data from numerous online product repositories across the business, including:  Customer account metadata  Administrative activity logs  Product authentication logs  Transaction logs
  • 9. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 9 The fraud detection system processes user activity records throughout every day to identify anomalous activity by utilizing rules-based criteria, including: - Geo Location - Time Stamp - Industry - Authentication Method - Search Type - Search Velocity - Search Volume and - Previous User Activity Overview of IADP Fraud Detection
  • 10. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 10 Trained investigators follow a documented investigative process to respond to raised alerts. Steps in the investigation process include: - User search records are logged and maintained and exception activity reports are appropriately reviewed and investigated, as necessary. - Security incidents are responded to in accordance with the Investigation Process Investigations & Incident Response Overview of IADP
  • 11. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 11 The process collects appropriate searches that are then sent to the customer to verify that selected searches were authorized, conducted for legitimate business purposes, and in accordance with legal and regulatory requirements. These include random audits, event- driven audits, and audits in which customers conduct searches on high profile individuals. Ongoing Compliance Overview of IADP
  • 12. Overview of IADP Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 12 For the IADP to respond more appropriately to the current and future environment, we need to adapt, grow, and capitalize on all data and analysis available, using new technology to its full advantage. Continuous Improvement
  • 13. Overview of IADP Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 13 For the IADP to respond more appropriately to the current and future environment, we need to adapt, grow, and capitalize on all data and analysis available, using new technology to its full advantage. Continuous Improvement Effectiveness: are we monitoring, alerting and auditing on the right things  Data is complete and accurate  Sufficient coverage of high risk applications and markets  Improve accuracy of fraud detection parameters: more on-point hits; reduction of false positives Going forward:  Emphasis on behavioral vs location and time-based analytics  Shift toward data modeling instead of reactive response
  • 14. Overview of IADP Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 14 For the IADP to respond more appropriately to the current and future environment, we need to adapt, grow, and capitalize on all data and analysis available, using new technology to its full advantage. Continuous Improvement Effectiveness: are we monitoring, alerting and auditing on the right things  Data is complete and accurate  Sufficient coverage of high risk applications and markets  Improve accuracy of fraud detection parameters: more on-point hits; reduction of false positives Going forward:  Emphasis on behavioral vs location and time-based analytics  Shift toward data modeling instead of reactive response Efficiency: do we identify suspicious activity and respond quickly and accurately  Automate processes so that critical tasks can be completed quickly and easily  Notifications of potentially high risk incidents are given special attention  Information and data necessary to complete investigations and audits is readily available Going forward  Increased use of visualization and analytical tools  Improved workflow integration
  • 15. Data Ingestion Operational Considerations – Workflow Integration Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 15 Landing Zone ProductsCustome r HPCC Systems Cluster Reporting Tools IADP User
  • 16. Report Queries Operational Considerations – Workflow Integration Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 16 Landing Zone ProductsCustome r HPCC Systems Cluster Reporting Tools IADP User
  • 17. Process State Tracking Operational Considerations – Workflow Integration Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 17 Landing Zone ProductsCustome r HPCC Systems Cluster Reporting Tools IADP User MySQL
  • 18. Process State Tracking Operational Considerations – Workflow Integration Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 18 Landing Zone ProductsCustome r HPCC Systems Cluster Reporting Tools IADP User MySQL Dashboar d IADP Operation s
  • 19. Operational Considerations – Data Management Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 19 Landing Zone Space Management HPCC Systems Landing Zone Truncation Process
  • 20. Operational Considerations – Data Management Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 20 Data Normalization HPCC Systems Cluster Fnam e First Name Lnam e Last Name BillCode Company No FirstNam e LastNam eAccountI D Normalization Process
  • 21. Operational Considerations – Data Management Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 21 Record Versioning HPCC Systems Cluster UserID: JSmith1Phone: 9375551234 UserID: JSmith1Phone: 6145550077 Date: 3/5/2018 Date: 1/23/2019 UserID: JSmith1Phone: 5135559000Date: 12/2/2017 Version: 1 Version: 2 Version: 3 Record Update Process
  • 22. Operational Considerations – Data Management Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 22 Data Truncation HPCC Systems Cluster Truncation Process
  • 23. User Authentication/Authorization Operational Considerations – Security Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 23 HPCC Systems Cluster Reporting Tools IADP User Active Directory IADP Operation s Other Systems
  • 24. Encryption Operational Considerations – Security Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 24 HPCC Systems Cluster Reporting Tools IADP User Active Directory IADP Operation s Other Systems
  • 25. Project Requirements Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 25 Check Every User Event for Fraud as soon as it is created. Create and Deliver the Reports requested by Investigators in the Shortest time Possible.
  • 26. Project Requirements Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 26 Process more than 30M records per day Data from more than 60 Data Sources Meta Data, Look up Data and IP Geo Location Data Create Reports based on Investigators Search Requests
  • 27. Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 27
  • 28. Application Architecture Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 28 HPCC Systems Data Ingestion Fraud Detection/Alerts Advanced Search/Reporting IADP Web Application Elastic Search My SQL Reports Repository Meta Data IP Geo Location Data Authentication Transaction Logs
  • 29. Data Processing Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 29 Meta Data
  • 30. Data Processing Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 30 IP Geo Location Data Meta Data
  • 31. Data Processing Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 31 Data Validation Data Formatting Data Enhancement Fraud CheckBuild Indexes Index’s Query Processor IP Geo Location Data Meta Data User Action Logs Web Application Elastic Search My SQL
  • 32. HPCC Systems – Cluster Architecture 32 IADP Data Meta Data IP Geo Location Transaction Logs ECL Programming Language Thor Q1 Data Ingestion/Fraud Detection Thor Q2 Query processing/Report Creation Query Visualize Connect Query Processing Data Processing Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework
  • 33. Conclusions Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 33 Time taken to check every user event for fraud is reduced from hours to minutes Faster Report Creation New, more complex Queries More exhaustive Fraud detection
  • 34. View this presentation on YouTube: https://www.youtube.com/watch?v=O-qJwxhQTzA&list=PL- 8MJMUpp8IKH5-d56az56t52YccleX5h&index=2&t=18s Starts at: 52:25 Leveraging HPCC Systems as Part of an Information Security, Privacy, and Compliance Framework 34