SlideShare a Scribd company logo
1 of 16
Download to read offline
10/30/13	

Rakuten Technical Conference 2013
26 Oct 2013

Security Meets Analytics
Service Computing, IBM Research – Tokyo
IPSJ Director
Naohiko Uramoto

© 2013 IBM Corporation

Self introduction – My four hats as a tech person	

§ My business as IBMer
–  Leading Cloud and security projects in IBM Research –
Tokyo
§ Internal tech community
–  Member of Academy of Technology (AoT), IBM’s crossorganizational technical community
§ External Tech community
–  Secretariat of “Cloud Kenkyu-kai”
§ Academia
– Director of Information Processing Society in Japan

2

© 2013 IBM Corporation

1
10/30/13	

Information Processing Society of Japan (IPSJ)
§ Founded in 1960
§ More than 20,000 members (from academia & industry)
§ Board of Directors
–  President: Masaru Kitsuregawa (Director of NII and Prof. of
U-Tokyo)
–  25 board members (including me)
§ Tight relationship with international communities
–  Long term relationship with IEEE-CS, ACM etc.
–  Organizing and supporting international conferences
§  Activities
–  40 SIGs in 3 Domains
–  Many conferences, seminars, events not only for academia but
also engineers and students
– 
e.g. Digital Practice Papers which focus on best practice
NII: National Institute of Informatics Japan
IFIP: International Federation of Information Processing	

© 2013 IBM Corporation

IBM Academy of Technology (AoT)
AoT Goal
The inspiring and inclusive
academy of eminent
technology thought leaders
that have an enduring impact
on the IT industry that makes
the world better.
100 AoT leadership
members
n  1,000 AoT members
with selection
n  44 affiliates with 5,500
members
n  TEC-J in Japan

Client
Value
Career
Development

n 

Networking

Consultancies
Studies
Conferences
Technical Advocate
Programme
Mentoring

Skills
Development

Technology
Impact

Leadership
Skills

Think
Time

www.ibm.com/ibm/academy‎	
4

© 2013 IBM Corporation

2
10/30/13	

5

© 2013 IBM Corporation

What is the good balance?	

Internal
Tech
Community	
Personal
Life	
External
Academia	
Tech
Community	

Daily Job	

6

© 2013 IBM Corporation

3
10/30/13	

World is changing…	

7

© 2013 IBM Corporation

New security technology is required to support transformation of the
world

New IT

New Data

New World

8

§  Social, Mobile,
§  Blurred boundaries
Analytics, and Cloud
§  New types of
(SMAC)
vulnerabilities
§  Internet of Things (IoT)

§  Big Data
§  Data Economy
§  Social Business

§  Data protection for
Security and Privacy
§  Logs and events as
Big Data

§  Cyberspace
§  Globalization and
emerging market

§  Cyber crime
across geos and
organizations

© 2013 IBM Corporation

4
10/30/13	

The sophistication of Cyber threats, attackers and motives is rapidly
escalating

© 2013 IBM Corporation

Global Security Trends

10 SOCs	

IBM X-Force 2013 Mid-Year Trend
and Risk Report is available
§  Analyzed 4,100 new security
vulnerabilities
§  Analyzed 900 million new web
pages and images
§  Created 27 million new or updated
entries in the IBM web filter
database
§  Created 180 million new, updated,
or deleted signatures in the IBM
spam filter database
http://www.ibm.com/security/xforce/	
10

© 2013 IBM Corporation

5
10/30/13	

11

© 2013 IBM Corporation

12

© 2013 IBM Corporation

6
10/30/13	

13

© 2013 IBM Corporation

14

© 2013 IBM Corporation

7
10/30/13	

Why are we losing the game?	

15

© 2013 IBM Corporation

Attacker can prepare with enough time to know about the
target
–  What is the target company or organization?
–  What kinds of topics are employees interested in?
–  What sites do employees often visit?
–  Which web browser is used in the target comapny?
–  Which anti virus product used?
–  …	

16

© 2013 IBM Corporation

8
10/30/13	

Why traditional defense is not enough? Some insights:	
n 

n 

n 

n 

n 

Break in a trusted partner and then loading malware onto
the target’s network
Creating designer malware tailored to only infect the target
organization, preventing identification by security vendors
Using social networking and social engineering to perform
reconnaissance on spear-phishing targets, leading to
compromised hosts and accounts
Exploiting zero-day vulnerabilities to gain access to data,
applications, systems, and endpoints
Communicating over accepted channels such as port 80 to
exfiltrate data from the organization

17

© 2013 IBM Corporation

Enterprise network is evolving	
Servers
Applications	

VMs on Private
Cloud

Switch	
FW	

IPS/IDS	

Client PCs	

Internet	
Anti Virus	
Mobile Devices	

18

© 2013 IBM Corporation

9
10/30/13	

Traditional Perimeter based defense	
Protect corprate
network and
endpoints from
attacks	

Servers
Applications	

VMs on Private
Cloud

Switch	
FW	
Internet	

Client PCs	

IPS/IDS	
Anti Virus	
Mobile Devices	

19

© 2013 IBM Corporation

Now we need to assume invasion of malware	
Servers
Applications	

VMs on Private
Cloud

Attacker’s
FW	
Command & Control
Internet	
Server	

Switch	

Protect outgoing
connections to prevent
from data leakage,
assuming that malware
exists in the network. 	
20

Client PCs	

IPS/IDS	
Anti Virus	
Mobile Devices	

© 2013 IBM Corporation

10
10/30/13	

Now we need to assume invasion of malware	
Servers
Applications	

VMs on Private
Cloud

Attacker’s
FW	
Command & Control
Internet	
Server	

Switch	

Client PCs	

IPS/IDS	
Anti Virus	
Mobile Devices	

Monitor network &
endpoints and detect
malware’s and
attacker’s activities	
21

© 2013 IBM Corporation

How can we do it?	

22

© 2013 IBM Corporation

11
10/30/13	

Security information and Event Management (SIEM)	
Security Operation
Center (SOC)	

System
audit trails

Business
process data

Configuration
information

Network flows
and anomalies

External threat
intelligence feeds

Middileware log

Full packet and
DNS captures

Internet	

Application log

Switch	

Access log

IPS/IDS	

FW	
Web page
text

OS level log

E-mail and
social activity

Mobile device
information
Download from
app stores

Endpoint
information
23

© 2013 IBM Corporation

Security Intelligence

Security Information and Event Management (SIEM)
Extensive Data Sources

+

Deep Intelligence

=

Exceptionally Accurate
and Actionable Insight

© 2013 IBM Corporation

12
10/30/13	

QRadar: Intelligent Event Management and Attack Detection
Provide information on attack with a comprehensive and integrated view

What kind of
attack?	
Who is attacking?	
From where?	

What is the
business
value?


What are the
attacked
assets?	
Does the asset
have vulnerability?	
What is the
evidence of
attack?	

25

© 2013 IBM Corporation

Flow of Security Analytics
Machine learning and near real-time monitoring enables continuous
refinement and tracking of ‘normal’
Filtering

Correlation

Network
Events

Behavior
Model

異常検知
予兆監視

Login
Information

Alerting
Access
Log

Social
Events

Analysis
Engine

Transformation
© 2013 IBM Corporation

13
10/30/13	

Security Analytics is built on a common platform and applied to
multiple areas
Network & Device
Analytics
Analyze network
packets and events for
anomaly detection and
risk prediction

Asset Analytics
Classify and visualize
enterprise assets to
protect them from
information leakage

User Access
Analytics
Anomaly detection
and risk prediction
from user / group
access log

Security Analytics
Platform
Business Process
Analytics
Clarify business
process and detect
security and
compliance issues

Social Network
Analytics
Detect potential risk
from social graphs
on SNS such as
Facebook and Twitter
© 2013 IBM Corporation

Event Correlation
Correlation of Logs across middleware and application stacks
•  Heuristics on time sequence
•  Pattern extraction
Middleware1	
Middleware3	
Middleware4	
 App1	
Middleware2	

28	
  

© 2013 IBM Corporation

14
10/30/13	

Process-File Dependency Visualization
Detect dependency between processes and files on a PC

Process	

File	

29	
  

© 2013 IBM Corporation

Integration Architecture of QRadar, DLP and IBM Endpoint Manager	
QFlow monitors
network Trafic
QFlow	

QRador correlates
network and endpoint
information

Network events
Endpoint log (e.g. file
access, process start)
DLP	
  
Server	

IEM	

Agent	

Endpoint	
  (PC)	
  

Endpoint
Manager
dispatch policies
to be enforced

Endpoint DLP
monitors user’s
behavior
30

© 2013 IBM Corporation

15
10/30/13	

31

© 2013 IBM Corporation

16

More Related Content

What's hot

IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)Rui Miguel Feio
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification coursechandrashekar965278
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajanShwetank Jayaswal
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2Jorge Sebastiao
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationEryk Budi Pratama
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadIBM Security
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014Truong Minh Yen
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specificationsSsendiSamuel
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0grp362
 

What's hot (20)

IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
14 june
14 june14 june
14 june
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2ITS Datamatix Gitex Conference 2009 New ICT Security V2
ITS Datamatix Gitex Conference 2009 New ICT Security V2
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 

Viewers also liked

[RakutenTechConf2013] [E-4] FUSION Forensics - A Critical Information Handlin...
[RakutenTechConf2013] [E-4] FUSION Forensics - A Critical Information Handlin...[RakutenTechConf2013] [E-4] FUSION Forensics - A Critical Information Handlin...
[RakutenTechConf2013] [E-4] FUSION Forensics - A Critical Information Handlin...Rakuten Group, Inc.
 
[Rakuten TechConf2014] [Sendai] Sense of SENS
[Rakuten TechConf2014] [Sendai] Sense of SENS[Rakuten TechConf2014] [Sendai] Sense of SENS
[Rakuten TechConf2014] [Sendai] Sense of SENSRakuten Group, Inc.
 
楽天ブックスiPhoneアプリ開発日誌 ~導かれし者たち~
楽天ブックスiPhoneアプリ開発日誌 ~導かれし者たち~楽天ブックスiPhoneアプリ開発日誌 ~導かれし者たち~
楽天ブックスiPhoneアプリ開発日誌 ~導かれし者たち~Rakuten Group, Inc.
 
MongoDB: Intro & Application for Big Data
MongoDB: Intro & Application  for Big DataMongoDB: Intro & Application  for Big Data
MongoDB: Intro & Application for Big DataTakahiro Inoue
 
[Rakuten TechConf2014] [G-4] Beyond Agile Testing to Lean Development
[Rakuten TechConf2014] [G-4] Beyond Agile Testing to Lean Development[Rakuten TechConf2014] [G-4] Beyond Agile Testing to Lean Development
[Rakuten TechConf2014] [G-4] Beyond Agile Testing to Lean DevelopmentRakuten Group, Inc.
 
[Rakuten TechConf2014] [Sendai] Global work in Tohoku Region!
[Rakuten TechConf2014] [Sendai] Global work in Tohoku Region![Rakuten TechConf2014] [Sendai] Global work in Tohoku Region!
[Rakuten TechConf2014] [Sendai] Global work in Tohoku Region!Rakuten Group, Inc.
 
[Rakuten TechConf2014] [F-6] Changing the Behavior of IT
[Rakuten TechConf2014] [F-6] Changing the Behavior of IT[Rakuten TechConf2014] [F-6] Changing the Behavior of IT
[Rakuten TechConf2014] [F-6] Changing the Behavior of ITRakuten Group, Inc.
 
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...Rakuten Group, Inc.
 
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service deliveryRakuten Group, Inc.
 
Rakuten Technology Conference 2013 Lightning Talks
Rakuten Technology Conference 2013 Lightning TalksRakuten Technology Conference 2013 Lightning Talks
Rakuten Technology Conference 2013 Lightning TalksMayumi Emori
 
[RakutenTechConf2013] [E-2] HTML5 in Rakuten
[RakutenTechConf2013] [E-2] HTML5 in Rakuten[RakutenTechConf2013] [E-2] HTML5 in Rakuten
[RakutenTechConf2013] [E-2] HTML5 in RakutenRakuten Group, Inc.
 
RakutenTechConf2013] [D-3_1] LeoFS - Open the New Door
RakutenTechConf2013] [D-3_1] LeoFS - Open the New DoorRakutenTechConf2013] [D-3_1] LeoFS - Open the New Door
RakutenTechConf2013] [D-3_1] LeoFS - Open the New DoorRakuten Group, Inc.
 
The Economics of a Cloud Computer 「クラウドコンピュータ」の経済学 - 楽天テクノロジーカンファレンス講演
The Economics of a Cloud Computer 「クラウドコンピュータ」の経済学 - 楽天テクノロジーカンファレンス講演The Economics of a Cloud Computer 「クラウドコンピュータ」の経済学 - 楽天テクノロジーカンファレンス講演
The Economics of a Cloud Computer 「クラウドコンピュータ」の経済学 - 楽天テクノロジーカンファレンス講演Atsushi Nakada
 
[RakutenTechConf2013] [C-2_1] Viki - Technology evolution from idea to acquis...
[RakutenTechConf2013] [C-2_1] Viki - Technology evolution from idea to acquis...[RakutenTechConf2013] [C-2_1] Viki - Technology evolution from idea to acquis...
[RakutenTechConf2013] [C-2_1] Viki - Technology evolution from idea to acquis...Rakuten Group, Inc.
 
[Rakuten TechConf2014] [E-6] Rakuten Ichiba Globalization - Challenges and So...
[Rakuten TechConf2014] [E-6] Rakuten Ichiba Globalization - Challenges and So...[Rakuten TechConf2014] [E-6] Rakuten Ichiba Globalization - Challenges and So...
[Rakuten TechConf2014] [E-6] Rakuten Ichiba Globalization - Challenges and So...Rakuten Group, Inc.
 
[RakutenTechConf2013] [LT] Scrum of Global Ichiba
[RakutenTechConf2013] [LT] Scrum of Global Ichiba[RakutenTechConf2013] [LT] Scrum of Global Ichiba
[RakutenTechConf2013] [LT] Scrum of Global Ichiba Rakuten Group, Inc.
 
[Rakuten TechConf2014] [E-5] Gra-navi
[Rakuten TechConf2014] [E-5] Gra-navi[Rakuten TechConf2014] [E-5] Gra-navi
[Rakuten TechConf2014] [E-5] Gra-naviRakuten Group, Inc.
 
[Rakuten TechConf2014] [A-5] Lessons learned from Ruby
[Rakuten TechConf2014] [A-5] Lessons learned from Ruby[Rakuten TechConf2014] [A-5] Lessons learned from Ruby
[Rakuten TechConf2014] [A-5] Lessons learned from RubyRakuten Group, Inc.
 
[Rakuten TechConf2014] [B-4] Rakuten Technology Conference Diversity session
[Rakuten TechConf2014] [B-4] Rakuten Technology Conference Diversity session[Rakuten TechConf2014] [B-4] Rakuten Technology Conference Diversity session
[Rakuten TechConf2014] [B-4] Rakuten Technology Conference Diversity sessionRakuten Group, Inc.
 

Viewers also liked (20)

[RakutenTechConf2013] [E-4] FUSION Forensics - A Critical Information Handlin...
[RakutenTechConf2013] [E-4] FUSION Forensics - A Critical Information Handlin...[RakutenTechConf2013] [E-4] FUSION Forensics - A Critical Information Handlin...
[RakutenTechConf2013] [E-4] FUSION Forensics - A Critical Information Handlin...
 
[Rakuten TechConf2014] [Sendai] Sense of SENS
[Rakuten TechConf2014] [Sendai] Sense of SENS[Rakuten TechConf2014] [Sendai] Sense of SENS
[Rakuten TechConf2014] [Sendai] Sense of SENS
 
楽天ブックスiPhoneアプリ開発日誌 ~導かれし者たち~
楽天ブックスiPhoneアプリ開発日誌 ~導かれし者たち~楽天ブックスiPhoneアプリ開発日誌 ~導かれし者たち~
楽天ブックスiPhoneアプリ開発日誌 ~導かれし者たち~
 
MongoDB: Intro & Application for Big Data
MongoDB: Intro & Application  for Big DataMongoDB: Intro & Application  for Big Data
MongoDB: Intro & Application for Big Data
 
[Rakuten TechConf2014] [G-4] Beyond Agile Testing to Lean Development
[Rakuten TechConf2014] [G-4] Beyond Agile Testing to Lean Development[Rakuten TechConf2014] [G-4] Beyond Agile Testing to Lean Development
[Rakuten TechConf2014] [G-4] Beyond Agile Testing to Lean Development
 
[Rakuten TechConf2014] [Sendai] Global work in Tohoku Region!
[Rakuten TechConf2014] [Sendai] Global work in Tohoku Region![Rakuten TechConf2014] [Sendai] Global work in Tohoku Region!
[Rakuten TechConf2014] [Sendai] Global work in Tohoku Region!
 
[Rakuten TechConf2014] [F-6] Changing the Behavior of IT
[Rakuten TechConf2014] [F-6] Changing the Behavior of IT[Rakuten TechConf2014] [F-6] Changing the Behavior of IT
[Rakuten TechConf2014] [F-6] Changing the Behavior of IT
 
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
 
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
[Rakuten TechConf2014] [Fukuoka] Technologies that underlie service delivery
 
Rakuten Technology Conference 2013 Lightning Talks
Rakuten Technology Conference 2013 Lightning TalksRakuten Technology Conference 2013 Lightning Talks
Rakuten Technology Conference 2013 Lightning Talks
 
[RakutenTechConf2013] [E-2] HTML5 in Rakuten
[RakutenTechConf2013] [E-2] HTML5 in Rakuten[RakutenTechConf2013] [E-2] HTML5 in Rakuten
[RakutenTechConf2013] [E-2] HTML5 in Rakuten
 
RakutenTechConf2013] [D-3_1] LeoFS - Open the New Door
RakutenTechConf2013] [D-3_1] LeoFS - Open the New DoorRakutenTechConf2013] [D-3_1] LeoFS - Open the New Door
RakutenTechConf2013] [D-3_1] LeoFS - Open the New Door
 
The Economics of a Cloud Computer 「クラウドコンピュータ」の経済学 - 楽天テクノロジーカンファレンス講演
The Economics of a Cloud Computer 「クラウドコンピュータ」の経済学 - 楽天テクノロジーカンファレンス講演The Economics of a Cloud Computer 「クラウドコンピュータ」の経済学 - 楽天テクノロジーカンファレンス講演
The Economics of a Cloud Computer 「クラウドコンピュータ」の経済学 - 楽天テクノロジーカンファレンス講演
 
[RakutenTechConf2013] [C-2_1] Viki - Technology evolution from idea to acquis...
[RakutenTechConf2013] [C-2_1] Viki - Technology evolution from idea to acquis...[RakutenTechConf2013] [C-2_1] Viki - Technology evolution from idea to acquis...
[RakutenTechConf2013] [C-2_1] Viki - Technology evolution from idea to acquis...
 
[Rakuten TechConf2014] [E-6] Rakuten Ichiba Globalization - Challenges and So...
[Rakuten TechConf2014] [E-6] Rakuten Ichiba Globalization - Challenges and So...[Rakuten TechConf2014] [E-6] Rakuten Ichiba Globalization - Challenges and So...
[Rakuten TechConf2014] [E-6] Rakuten Ichiba Globalization - Challenges and So...
 
[RakutenTechConf2013] [LT] Scrum of Global Ichiba
[RakutenTechConf2013] [LT] Scrum of Global Ichiba[RakutenTechConf2013] [LT] Scrum of Global Ichiba
[RakutenTechConf2013] [LT] Scrum of Global Ichiba
 
[Rakuten TechConf2014] [E-5] Gra-navi
[Rakuten TechConf2014] [E-5] Gra-navi[Rakuten TechConf2014] [E-5] Gra-navi
[Rakuten TechConf2014] [E-5] Gra-navi
 
[Rakuten TechConf2014] [A-5] Lessons learned from Ruby
[Rakuten TechConf2014] [A-5] Lessons learned from Ruby[Rakuten TechConf2014] [A-5] Lessons learned from Ruby
[Rakuten TechConf2014] [A-5] Lessons learned from Ruby
 
Agile meets waterfall
Agile meets waterfallAgile meets waterfall
Agile meets waterfall
 
[Rakuten TechConf2014] [B-4] Rakuten Technology Conference Diversity session
[Rakuten TechConf2014] [B-4] Rakuten Technology Conference Diversity session[Rakuten TechConf2014] [B-4] Rakuten Technology Conference Diversity session
[Rakuten TechConf2014] [B-4] Rakuten Technology Conference Diversity session
 

Similar to [RakutenTechConf2013] [A-0] Security Meets Analytics

IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUDTHRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUDAM Publications,India
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9UISGCON
 
4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptxromawoodz
 
IBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahasIBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahasShwetank Jayaswal
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 

Similar to [RakutenTechConf2013] [A-0] Security Meets Analytics (20)

IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUDTHRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx
 
IBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahasIBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahas
 
76 s201913
76 s20191376 s201913
76 s201913
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
20120130406025
2012013040602520120130406025
20120130406025
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 

More from Rakuten Group, Inc.

コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話
コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話
コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話Rakuten Group, Inc.
 
楽天における安全な秘匿情報管理への道のり
楽天における安全な秘匿情報管理への道のり楽天における安全な秘匿情報管理への道のり
楽天における安全な秘匿情報管理への道のりRakuten Group, Inc.
 
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...Rakuten Group, Inc.
 
DataSkillCultureを浸透させる楽天の取り組み
DataSkillCultureを浸透させる楽天の取り組みDataSkillCultureを浸透させる楽天の取り組み
DataSkillCultureを浸透させる楽天の取り組みRakuten Group, Inc.
 
大規模なリアルタイム監視の導入と展開
大規模なリアルタイム監視の導入と展開大規模なリアルタイム監視の導入と展開
大規模なリアルタイム監視の導入と展開Rakuten Group, Inc.
 
楽天における大規模データベースの運用
楽天における大規模データベースの運用楽天における大規模データベースの運用
楽天における大規模データベースの運用Rakuten Group, Inc.
 
楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャー楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャーRakuten Group, Inc.
 
楽天の規模とクラウドプラットフォーム統括部の役割
楽天の規模とクラウドプラットフォーム統括部の役割楽天の規模とクラウドプラットフォーム統括部の役割
楽天の規模とクラウドプラットフォーム統括部の役割Rakuten Group, Inc.
 
Rakuten Services and Infrastructure Team.pdf
Rakuten Services and Infrastructure Team.pdfRakuten Services and Infrastructure Team.pdf
Rakuten Services and Infrastructure Team.pdfRakuten Group, Inc.
 
The Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdfThe Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdfRakuten Group, Inc.
 
Supporting Internal Customers as Technical Account Managers.pdf
Supporting Internal Customers as Technical Account Managers.pdfSupporting Internal Customers as Technical Account Managers.pdf
Supporting Internal Customers as Technical Account Managers.pdfRakuten Group, Inc.
 
Making Cloud Native CI_CD Services.pdf
Making Cloud Native CI_CD Services.pdfMaking Cloud Native CI_CD Services.pdf
Making Cloud Native CI_CD Services.pdfRakuten Group, Inc.
 
How We Defined Our Own Cloud.pdf
How We Defined Our Own Cloud.pdfHow We Defined Our Own Cloud.pdf
How We Defined Our Own Cloud.pdfRakuten Group, Inc.
 
Travel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech infoTravel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech infoRakuten Group, Inc.
 
Travel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech infoTravel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech infoRakuten Group, Inc.
 
Introduction of GORA API Group technology
Introduction of GORA API Group technologyIntroduction of GORA API Group technology
Introduction of GORA API Group technologyRakuten Group, Inc.
 
100PBを越えるデータプラットフォームの実情
100PBを越えるデータプラットフォームの実情100PBを越えるデータプラットフォームの実情
100PBを越えるデータプラットフォームの実情Rakuten Group, Inc.
 
社内エンジニアを支えるテクニカルアカウントマネージャー
社内エンジニアを支えるテクニカルアカウントマネージャー社内エンジニアを支えるテクニカルアカウントマネージャー
社内エンジニアを支えるテクニカルアカウントマネージャーRakuten Group, Inc.
 

More from Rakuten Group, Inc. (20)

コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話
コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話
コードレビュー改善のためにJenkinsとIntelliJ IDEAのプラグインを自作してみた話
 
楽天における安全な秘匿情報管理への道のり
楽天における安全な秘匿情報管理への道のり楽天における安全な秘匿情報管理への道のり
楽天における安全な秘匿情報管理への道のり
 
What Makes Software Green?
What Makes Software Green?What Makes Software Green?
What Makes Software Green?
 
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...
Simple and Effective Knowledge-Driven Query Expansion for QA-Based Product At...
 
DataSkillCultureを浸透させる楽天の取り組み
DataSkillCultureを浸透させる楽天の取り組みDataSkillCultureを浸透させる楽天の取り組み
DataSkillCultureを浸透させる楽天の取り組み
 
大規模なリアルタイム監視の導入と展開
大規模なリアルタイム監視の導入と展開大規模なリアルタイム監視の導入と展開
大規模なリアルタイム監視の導入と展開
 
楽天における大規模データベースの運用
楽天における大規模データベースの運用楽天における大規模データベースの運用
楽天における大規模データベースの運用
 
楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャー楽天サービスを支えるネットワークインフラストラクチャー
楽天サービスを支えるネットワークインフラストラクチャー
 
楽天の規模とクラウドプラットフォーム統括部の役割
楽天の規模とクラウドプラットフォーム統括部の役割楽天の規模とクラウドプラットフォーム統括部の役割
楽天の規模とクラウドプラットフォーム統括部の役割
 
Rakuten Services and Infrastructure Team.pdf
Rakuten Services and Infrastructure Team.pdfRakuten Services and Infrastructure Team.pdf
Rakuten Services and Infrastructure Team.pdf
 
The Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdfThe Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdf
 
Supporting Internal Customers as Technical Account Managers.pdf
Supporting Internal Customers as Technical Account Managers.pdfSupporting Internal Customers as Technical Account Managers.pdf
Supporting Internal Customers as Technical Account Managers.pdf
 
Making Cloud Native CI_CD Services.pdf
Making Cloud Native CI_CD Services.pdfMaking Cloud Native CI_CD Services.pdf
Making Cloud Native CI_CD Services.pdf
 
How We Defined Our Own Cloud.pdf
How We Defined Our Own Cloud.pdfHow We Defined Our Own Cloud.pdf
How We Defined Our Own Cloud.pdf
 
Travel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech infoTravel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech info
 
Travel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech infoTravel & Leisure Platform Department's tech info
Travel & Leisure Platform Department's tech info
 
OWASPTop10_Introduction
OWASPTop10_IntroductionOWASPTop10_Introduction
OWASPTop10_Introduction
 
Introduction of GORA API Group technology
Introduction of GORA API Group technologyIntroduction of GORA API Group technology
Introduction of GORA API Group technology
 
100PBを越えるデータプラットフォームの実情
100PBを越えるデータプラットフォームの実情100PBを越えるデータプラットフォームの実情
100PBを越えるデータプラットフォームの実情
 
社内エンジニアを支えるテクニカルアカウントマネージャー
社内エンジニアを支えるテクニカルアカウントマネージャー社内エンジニアを支えるテクニカルアカウントマネージャー
社内エンジニアを支えるテクニカルアカウントマネージャー
 

Recently uploaded

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 

Recently uploaded (20)

Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

[RakutenTechConf2013] [A-0] Security Meets Analytics

  • 1. 10/30/13 Rakuten Technical Conference 2013 26 Oct 2013 Security Meets Analytics Service Computing, IBM Research – Tokyo IPSJ Director Naohiko Uramoto © 2013 IBM Corporation Self introduction – My four hats as a tech person § My business as IBMer –  Leading Cloud and security projects in IBM Research – Tokyo § Internal tech community –  Member of Academy of Technology (AoT), IBM’s crossorganizational technical community § External Tech community –  Secretariat of “Cloud Kenkyu-kai” § Academia – Director of Information Processing Society in Japan 2 © 2013 IBM Corporation 1
  • 2. 10/30/13 Information Processing Society of Japan (IPSJ) § Founded in 1960 § More than 20,000 members (from academia & industry) § Board of Directors –  President: Masaru Kitsuregawa (Director of NII and Prof. of U-Tokyo) –  25 board members (including me) § Tight relationship with international communities –  Long term relationship with IEEE-CS, ACM etc. –  Organizing and supporting international conferences §  Activities –  40 SIGs in 3 Domains –  Many conferences, seminars, events not only for academia but also engineers and students –  e.g. Digital Practice Papers which focus on best practice NII: National Institute of Informatics Japan IFIP: International Federation of Information Processing © 2013 IBM Corporation IBM Academy of Technology (AoT) AoT Goal The inspiring and inclusive academy of eminent technology thought leaders that have an enduring impact on the IT industry that makes the world better. 100 AoT leadership members n  1,000 AoT members with selection n  44 affiliates with 5,500 members n  TEC-J in Japan Client Value Career Development n  Networking Consultancies Studies Conferences Technical Advocate Programme Mentoring Skills Development Technology Impact Leadership Skills Think Time www.ibm.com/ibm/academy‎ 4 © 2013 IBM Corporation 2
  • 3. 10/30/13 5 © 2013 IBM Corporation What is the good balance? Internal Tech Community Personal Life External Academia Tech Community Daily Job 6 © 2013 IBM Corporation 3
  • 4. 10/30/13 World is changing… 7 © 2013 IBM Corporation New security technology is required to support transformation of the world New IT New Data New World 8 §  Social, Mobile, §  Blurred boundaries Analytics, and Cloud §  New types of (SMAC) vulnerabilities §  Internet of Things (IoT) §  Big Data §  Data Economy §  Social Business §  Data protection for Security and Privacy §  Logs and events as Big Data §  Cyberspace §  Globalization and emerging market §  Cyber crime across geos and organizations © 2013 IBM Corporation 4
  • 5. 10/30/13 The sophistication of Cyber threats, attackers and motives is rapidly escalating © 2013 IBM Corporation Global Security Trends 10 SOCs IBM X-Force 2013 Mid-Year Trend and Risk Report is available §  Analyzed 4,100 new security vulnerabilities §  Analyzed 900 million new web pages and images §  Created 27 million new or updated entries in the IBM web filter database §  Created 180 million new, updated, or deleted signatures in the IBM spam filter database http://www.ibm.com/security/xforce/ 10 © 2013 IBM Corporation 5
  • 6. 10/30/13 11 © 2013 IBM Corporation 12 © 2013 IBM Corporation 6
  • 7. 10/30/13 13 © 2013 IBM Corporation 14 © 2013 IBM Corporation 7
  • 8. 10/30/13 Why are we losing the game? 15 © 2013 IBM Corporation Attacker can prepare with enough time to know about the target –  What is the target company or organization? –  What kinds of topics are employees interested in? –  What sites do employees often visit? –  Which web browser is used in the target comapny? –  Which anti virus product used? –  … 16 © 2013 IBM Corporation 8
  • 9. 10/30/13 Why traditional defense is not enough? Some insights: n  n  n  n  n  Break in a trusted partner and then loading malware onto the target’s network Creating designer malware tailored to only infect the target organization, preventing identification by security vendors Using social networking and social engineering to perform reconnaissance on spear-phishing targets, leading to compromised hosts and accounts Exploiting zero-day vulnerabilities to gain access to data, applications, systems, and endpoints Communicating over accepted channels such as port 80 to exfiltrate data from the organization 17 © 2013 IBM Corporation Enterprise network is evolving Servers Applications VMs on Private Cloud Switch FW IPS/IDS Client PCs Internet Anti Virus Mobile Devices 18 © 2013 IBM Corporation 9
  • 10. 10/30/13 Traditional Perimeter based defense Protect corprate network and endpoints from attacks Servers Applications VMs on Private Cloud Switch FW Internet Client PCs IPS/IDS Anti Virus Mobile Devices 19 © 2013 IBM Corporation Now we need to assume invasion of malware Servers Applications VMs on Private Cloud Attacker’s FW Command & Control Internet Server Switch Protect outgoing connections to prevent from data leakage, assuming that malware exists in the network. 20 Client PCs IPS/IDS Anti Virus Mobile Devices © 2013 IBM Corporation 10
  • 11. 10/30/13 Now we need to assume invasion of malware Servers Applications VMs on Private Cloud Attacker’s FW Command & Control Internet Server Switch Client PCs IPS/IDS Anti Virus Mobile Devices Monitor network & endpoints and detect malware’s and attacker’s activities 21 © 2013 IBM Corporation How can we do it? 22 © 2013 IBM Corporation 11
  • 12. 10/30/13 Security information and Event Management (SIEM) Security Operation Center (SOC) System audit trails Business process data Configuration information Network flows and anomalies External threat intelligence feeds Middileware log Full packet and DNS captures Internet Application log Switch Access log IPS/IDS FW Web page text OS level log E-mail and social activity Mobile device information Download from app stores Endpoint information 23 © 2013 IBM Corporation Security Intelligence Security Information and Event Management (SIEM) Extensive Data Sources + Deep Intelligence = Exceptionally Accurate and Actionable Insight © 2013 IBM Corporation 12
  • 13. 10/30/13 QRadar: Intelligent Event Management and Attack Detection Provide information on attack with a comprehensive and integrated view What kind of attack? Who is attacking? From where? What is the business value? What are the attacked assets? Does the asset have vulnerability? What is the evidence of attack? 25 © 2013 IBM Corporation Flow of Security Analytics Machine learning and near real-time monitoring enables continuous refinement and tracking of ‘normal’ Filtering Correlation Network Events Behavior Model 異常検知 予兆監視 Login Information Alerting Access Log Social Events Analysis Engine Transformation © 2013 IBM Corporation 13
  • 14. 10/30/13 Security Analytics is built on a common platform and applied to multiple areas Network & Device Analytics Analyze network packets and events for anomaly detection and risk prediction Asset Analytics Classify and visualize enterprise assets to protect them from information leakage User Access Analytics Anomaly detection and risk prediction from user / group access log Security Analytics Platform Business Process Analytics Clarify business process and detect security and compliance issues Social Network Analytics Detect potential risk from social graphs on SNS such as Facebook and Twitter © 2013 IBM Corporation Event Correlation Correlation of Logs across middleware and application stacks •  Heuristics on time sequence •  Pattern extraction Middleware1 Middleware3 Middleware4 App1 Middleware2 28   © 2013 IBM Corporation 14
  • 15. 10/30/13 Process-File Dependency Visualization Detect dependency between processes and files on a PC Process File 29   © 2013 IBM Corporation Integration Architecture of QRadar, DLP and IBM Endpoint Manager QFlow monitors network Trafic QFlow QRador correlates network and endpoint information Network events Endpoint log (e.g. file access, process start) DLP   Server IEM Agent Endpoint  (PC)   Endpoint Manager dispatch policies to be enforced Endpoint DLP monitors user’s behavior 30 © 2013 IBM Corporation 15
  • 16. 10/30/13 31 © 2013 IBM Corporation 16