SlideShare a Scribd company logo
The National Security Agency (NSA) == PRISM
Create Value in Projects
The National Security Agency's (NSA) surveillance system known as “PRISM” is
not a surprise to most Information Technology Experts. In fact, many experts
such as the companies (AOL Inc., Apple Inc., Facebook Inc., Google Inc.,
Microsoft Corp., Yahoo Inc., Skype, YouTube and Paltalk) who shared the
information with NSA are trying very hard to mitigate the risks in securing this
technology; however, in order for organizations to protect the people and or
consumers within their databases the major stakeholders have to understand,
analyze, and define the complexity and the corruption of this technology within
different environments and thereby apply the necessary compliance measures
and governance.
1) Know your rules and regulations for privacy and sharing of data and the politic
and policies behind the regulations.
2) Study the “white papers” such as Gartner “Market Scope for Enterprise File
Synchronization and Sharing” published February 12, 2013 and many other white
papers on innovative research on technologies.
3) Utilize the Project Management processes for planning your organization
compliance implementation
4) Utilize Secure Data Warehousing via Cloud Computing
5) Be Transparent to the public. PRISM’s data sharing should have not been a
secret. Core Stakeholders should disclose data sharing networks, companies
and or organizations for security surveillance in order to Create Value for their
public stakeholders.
6) Create Value Process Environmental Model from “Create Value in Projects”
6.0 Information Environment
6.1 Information Strategy
6.2 Strategy dialogue Among decision makers
6.3 Strategy Survey
6.4 Information Politics
6.5 Information Behavior and Culture
6.6 Management Information Behavior
6.7 Sharing Information
6.8 Handle Information Inspiration (Overload)
6.9 Information Staff
6.10 Information Process
6.10.1 Process Model
6.11 Information Architecture
6.11.1 Other Methods of Information Architecture
7.0 Organizational Environment
NSA –PRISM by Sonia Usih June 5, 2013
The National Security Agency (NSA) == PRISM
Create Value in Projects
7.1 Business Situation
7.2 Business Situation Survey
7.3 Technology Investment
7.4 Physical Arrangement
8.0 External Environment
8.1 Business Market
8.2 Technology Market
8.3 Information Market
9.0 Implementation
10.0 Benefits
NSA –PRISM by Sonia Usih June 5, 2013

More Related Content

What's hot

#19sverificado : How Data Analytics helped put order in chaos in Mexico's ...
#19sverificado :  How Data Analytics helped  put order in chaos in  Mexico's ...#19sverificado :  How Data Analytics helped  put order in chaos in  Mexico's ...
#19sverificado : How Data Analytics helped put order in chaos in Mexico's ...
Gustavo Rene Antunez
 
Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher Education
Kate Carruthers
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and Governance
Kate Carruthers
 
Big data
Big dataBig data
Big data
Priya Dharshini
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
administrator_confidis
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
Phil Agcaoili
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE - ATT&CKcon
 
Digital Marketing and your startup
Digital Marketing and your startupDigital Marketing and your startup
Digital Marketing and your startup
Kate Carruthers
 
Data at the centre of a complex world
Data at the centre of a complex world Data at the centre of a complex world
Data at the centre of a complex world
Kate Carruthers
 
Bio cv ulf mattsson
Bio cv ulf mattssonBio cv ulf mattsson
Bio cv ulf mattsson
Ulf Mattsson
 
Evolving a Cyber Space Doctrine
Evolving a Cyber Space DoctrineEvolving a Cyber Space Doctrine
Evolving a Cyber Space Doctrine
Michael Ruiz
 
Towards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsTowards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teams
Rick van der Kleij
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
Fabrizio Cilli
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Capgemini
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practice
Kate Carruthers
 
IoT et blockchain : perspective R&D
IoT et blockchain : perspective R&DIoT et blockchain : perspective R&D
IoT et blockchain : perspective R&D
Living Things
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
MarketingArrowECS_CZ
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
North Texas Chapter of the ISSA
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Black Duck by Synopsys
 
CDE Marketplace Sept 2016: BMT Defence Services (Autonomy & Big Data)
CDE Marketplace Sept 2016: BMT Defence Services (Autonomy & Big Data)CDE Marketplace Sept 2016: BMT Defence Services (Autonomy & Big Data)
CDE Marketplace Sept 2016: BMT Defence Services (Autonomy & Big Data)
Defence and Security Accelerator
 

What's hot (20)

#19sverificado : How Data Analytics helped put order in chaos in Mexico's ...
#19sverificado :  How Data Analytics helped  put order in chaos in  Mexico's ...#19sverificado :  How Data Analytics helped  put order in chaos in  Mexico's ...
#19sverificado : How Data Analytics helped put order in chaos in Mexico's ...
 
Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher Education
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and Governance
 
Big data
Big dataBig data
Big data
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
 
Digital Marketing and your startup
Digital Marketing and your startupDigital Marketing and your startup
Digital Marketing and your startup
 
Data at the centre of a complex world
Data at the centre of a complex world Data at the centre of a complex world
Data at the centre of a complex world
 
Bio cv ulf mattsson
Bio cv ulf mattssonBio cv ulf mattsson
Bio cv ulf mattsson
 
Evolving a Cyber Space Doctrine
Evolving a Cyber Space DoctrineEvolving a Cyber Space Doctrine
Evolving a Cyber Space Doctrine
 
Towards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsTowards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teams
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practice
 
IoT et blockchain : perspective R&D
IoT et blockchain : perspective R&DIoT et blockchain : perspective R&D
IoT et blockchain : perspective R&D
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
CDE Marketplace Sept 2016: BMT Defence Services (Autonomy & Big Data)
CDE Marketplace Sept 2016: BMT Defence Services (Autonomy & Big Data)CDE Marketplace Sept 2016: BMT Defence Services (Autonomy & Big Data)
CDE Marketplace Sept 2016: BMT Defence Services (Autonomy & Big Data)
 

Viewers also liked

My computer Hi-jacked
My computer Hi-jackedMy computer Hi-jacked
My computer Hi-jacked
Sonia Usih, PMP, MCPM, BSc.
 
To be sustainable
To be sustainableTo be sustainable
To be sustainable
Sonia Usih, PMP, MCPM, BSc.
 
Are Cloud Applications and Data more Vulnerable to Attacks?
Are Cloud Applications and Data more Vulnerable to Attacks?Are Cloud Applications and Data more Vulnerable to Attacks?
Are Cloud Applications and Data more Vulnerable to Attacks?
Sonia Usih, PMP, MCPM, BSc.
 
If you have Knowledge
If you have KnowledgeIf you have Knowledge
If you have Knowledge
Sonia Usih, PMP, MCPM, BSc.
 
Transformational servant-innovation leadership
Transformational servant-innovation leadershipTransformational servant-innovation leadership
Transformational servant-innovation leadership
Sonia Usih, PMP, MCPM, BSc.
 
Sonia Usih Career Brand
Sonia Usih Career BrandSonia Usih Career Brand
Sonia Usih Career Brand
Sonia Usih, PMP, MCPM, BSc.
 
Wild safari
Wild safariWild safari
Mediakittravelblogprojectspaceelenapaschinger 01072015
Mediakittravelblogprojectspaceelenapaschinger 01072015Mediakittravelblogprojectspaceelenapaschinger 01072015
Mediakittravelblogprojectspaceelenapaschinger 01072015
Kreativ Reisen Österreich / Creativelena.com
 
Info sacu
Info sacuInfo sacu
Info sacu
Sacu Uhu
 
Social Media Marketing for Higher Education
Social Media Marketing for Higher EducationSocial Media Marketing for Higher Education
Social Media Marketing for Higher Education
Jenny Mandeville
 
Effective Strategic Planning
Effective Strategic PlanningEffective Strategic Planning
Effective Strategic Planning
guestf480a
 
6th period presentation
6th period presentation6th period presentation
6th period presentation
Ethan Bergeron
 
Artikel os(rifki)
Artikel os(rifki)Artikel os(rifki)
Artikel os(rifki)
Rifki Maulana Hidayatullah
 
Fundiciones
FundicionesFundiciones
Fundiciones
Marcos Rondon
 
Pricebaba laptops
Pricebaba laptopsPricebaba laptops
Pricebaba laptops
Sakshi Joshi
 
Il marketing politico digitale per i circoli del Pd di Milano 24032015
Il marketing politico digitale per i circoli del Pd di Milano 24032015Il marketing politico digitale per i circoli del Pd di Milano 24032015
Il marketing politico digitale per i circoli del Pd di Milano 24032015
Andrea Boscaro
 
El periodico
El periodicoEl periodico
Mediakittravelblogprojectspaceelenapaschinger 01092015
Mediakittravelblogprojectspaceelenapaschinger 01092015Mediakittravelblogprojectspaceelenapaschinger 01092015
Mediakittravelblogprojectspaceelenapaschinger 01092015
Kreativ Reisen Österreich / Creativelena.com
 
Communion Service Dec. 25, 2016
Communion Service Dec. 25, 2016Communion Service Dec. 25, 2016
Communion Service Dec. 25, 2016
Wayne Cornwell
 
Matematica III
Matematica IIIMatematica III
Matematica III
yennifer Orozco
 

Viewers also liked (20)

My computer Hi-jacked
My computer Hi-jackedMy computer Hi-jacked
My computer Hi-jacked
 
To be sustainable
To be sustainableTo be sustainable
To be sustainable
 
Are Cloud Applications and Data more Vulnerable to Attacks?
Are Cloud Applications and Data more Vulnerable to Attacks?Are Cloud Applications and Data more Vulnerable to Attacks?
Are Cloud Applications and Data more Vulnerable to Attacks?
 
If you have Knowledge
If you have KnowledgeIf you have Knowledge
If you have Knowledge
 
Transformational servant-innovation leadership
Transformational servant-innovation leadershipTransformational servant-innovation leadership
Transformational servant-innovation leadership
 
Sonia Usih Career Brand
Sonia Usih Career BrandSonia Usih Career Brand
Sonia Usih Career Brand
 
Wild safari
Wild safariWild safari
Wild safari
 
Mediakittravelblogprojectspaceelenapaschinger 01072015
Mediakittravelblogprojectspaceelenapaschinger 01072015Mediakittravelblogprojectspaceelenapaschinger 01072015
Mediakittravelblogprojectspaceelenapaschinger 01072015
 
Info sacu
Info sacuInfo sacu
Info sacu
 
Social Media Marketing for Higher Education
Social Media Marketing for Higher EducationSocial Media Marketing for Higher Education
Social Media Marketing for Higher Education
 
Effective Strategic Planning
Effective Strategic PlanningEffective Strategic Planning
Effective Strategic Planning
 
6th period presentation
6th period presentation6th period presentation
6th period presentation
 
Artikel os(rifki)
Artikel os(rifki)Artikel os(rifki)
Artikel os(rifki)
 
Fundiciones
FundicionesFundiciones
Fundiciones
 
Pricebaba laptops
Pricebaba laptopsPricebaba laptops
Pricebaba laptops
 
Il marketing politico digitale per i circoli del Pd di Milano 24032015
Il marketing politico digitale per i circoli del Pd di Milano 24032015Il marketing politico digitale per i circoli del Pd di Milano 24032015
Il marketing politico digitale per i circoli del Pd di Milano 24032015
 
El periodico
El periodicoEl periodico
El periodico
 
Mediakittravelblogprojectspaceelenapaschinger 01092015
Mediakittravelblogprojectspaceelenapaschinger 01092015Mediakittravelblogprojectspaceelenapaschinger 01092015
Mediakittravelblogprojectspaceelenapaschinger 01092015
 
Communion Service Dec. 25, 2016
Communion Service Dec. 25, 2016Communion Service Dec. 25, 2016
Communion Service Dec. 25, 2016
 
Matematica III
Matematica IIIMatematica III
Matematica III
 

Similar to The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surprise to Technology Experts

Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
IRJET Journal
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
Subrat Swain
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Ulf Mattsson
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspective
Mateusz Maj
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013
Appinions
 
Data trawling and security strategies
Data trawling and security strategiesData trawling and security strategies
Data trawling and security strategies
Venkata Karthik Gullapalli
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
Ulf Mattsson
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Neil Raden
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
Sravan Ankaraju
 
Complete-SRS.doc
Complete-SRS.docComplete-SRS.doc
Complete-SRS.doc
jadhavpravin920
 
UNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdfUNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdf
vvpadhu
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Gosia Fraser
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
Charith Perera
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
Melissa Krasnow
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
Ulf Mattsson
 

Similar to The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surprise to Technology Experts (20)

Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspective
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013
 
Data trawling and security strategies
Data trawling and security strategiesData trawling and security strategies
Data trawling and security strategies
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Complete-SRS.doc
Complete-SRS.docComplete-SRS.doc
Complete-SRS.doc
 
UNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdfUNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdf
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 

Recently uploaded

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surprise to Technology Experts

  • 1. The National Security Agency (NSA) == PRISM Create Value in Projects The National Security Agency's (NSA) surveillance system known as “PRISM” is not a surprise to most Information Technology Experts. In fact, many experts such as the companies (AOL Inc., Apple Inc., Facebook Inc., Google Inc., Microsoft Corp., Yahoo Inc., Skype, YouTube and Paltalk) who shared the information with NSA are trying very hard to mitigate the risks in securing this technology; however, in order for organizations to protect the people and or consumers within their databases the major stakeholders have to understand, analyze, and define the complexity and the corruption of this technology within different environments and thereby apply the necessary compliance measures and governance. 1) Know your rules and regulations for privacy and sharing of data and the politic and policies behind the regulations. 2) Study the “white papers” such as Gartner “Market Scope for Enterprise File Synchronization and Sharing” published February 12, 2013 and many other white papers on innovative research on technologies. 3) Utilize the Project Management processes for planning your organization compliance implementation 4) Utilize Secure Data Warehousing via Cloud Computing 5) Be Transparent to the public. PRISM’s data sharing should have not been a secret. Core Stakeholders should disclose data sharing networks, companies and or organizations for security surveillance in order to Create Value for their public stakeholders. 6) Create Value Process Environmental Model from “Create Value in Projects” 6.0 Information Environment 6.1 Information Strategy 6.2 Strategy dialogue Among decision makers 6.3 Strategy Survey 6.4 Information Politics 6.5 Information Behavior and Culture 6.6 Management Information Behavior 6.7 Sharing Information 6.8 Handle Information Inspiration (Overload) 6.9 Information Staff 6.10 Information Process 6.10.1 Process Model 6.11 Information Architecture 6.11.1 Other Methods of Information Architecture 7.0 Organizational Environment NSA –PRISM by Sonia Usih June 5, 2013
  • 2. The National Security Agency (NSA) == PRISM Create Value in Projects 7.1 Business Situation 7.2 Business Situation Survey 7.3 Technology Investment 7.4 Physical Arrangement 8.0 External Environment 8.1 Business Market 8.2 Technology Market 8.3 Information Market 9.0 Implementation 10.0 Benefits NSA –PRISM by Sonia Usih June 5, 2013