SlideShare a Scribd company logo
1 of 43
Download to read offline
BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA
HAMBURG COPENHAGEN LAUSANNE MUNICH STUTTGART VIENNA ZURICH
Big Data
Privacy and Security Fundamentals
Florian van Keulen
Principal Consultant
BDS – Cloud & Security
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Florian	van	Keulen
Principal Consultant	– Cloud	&	Security
§ Über	15	Jahre	IT	Erfahrung
§ Trivadis	Sicherheitsbeauftragter	(SiBe |	Security	Officer)
§ Disziplin	Manager	“Infrastructure	Security”
§ Program	Manager	“Cloud	Computing“
Erfahrung:
§ Security	Konzept	&	Review,	Azure Private	
Cloud	Infrastructure	&	RemoteApp Services	
(Axpo	Trading)	
§ Securing Azure IoT Infrastructure	&	Azure
deployment Automation	(IWB)
§ Security	Konzept	Cloud	Collaboration
Platform Im	Gesundheitswesen	
§ Security	Review	RemoteAccess &	VDI	
Umgebung,	Privat	Bank
Spezialgebiet:
§ Cloud- und	Infrastructure	Security
§ Identity- und	Access	Management
§ Remote	Access	Lösungen
§ Cloud	Sicherheitsberatung
§ Datenschutz und	
Informationssicherheitsmanagement
§ Sicherheitskonzeption und	Analysen
§ Microsoft	Azure	Security	Solutions
…Neue	Umgebungen	bergen	nicht	nur	Risiken,	sondern	auch	Sicherheits-opportunitäten,	
wenn man	damit richtig umzugehen weiss.	Kritisch Hinterfragen,	Umdenken,	Verstehen	und	
Adaptieren – BigData	“sicher”	nutzen! Florian v. Keulen
Weiteres:
§ Zertifizierter IT-Sicherheitsbeauftragter
§ Cloud	Risk	Assessments	
§ Cloud	Readiness	Assessments
§ IT-SiBe Tätigkeiten	intern	und	für	Kunden
§ Beratung	für	IAM	und	Identity	Federation
im	Cloud	Umfeld	
2
Agenda
1. BigData Privacy & Security - Challenges
What is BigData | Data Breaches | Motivation | Top Chellanges
2. Privacy & Data Protection Regulation
PII | EU-GDPR | Privacy by Design
3. Security (Information Security)
Security Controls | Best Practices
4. Putting it together
09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals3
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
BigData Privacy & Security
Challenges
4
Big Data Definition (4 Vs)
+	Time	to	action	?	– Big	Data	+	Real-Time	=	Stream	Processing
Characteristics	of	Big	Data:	Its	Volume,	Velocity	
and	Variety	in	combination
09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals5
Data	
Acquisition
Data
Sources
Governance
Organisation
Information	
Provisioning Consumer
Data
Management
Trivadis Architecture Canvas for Analytical Applications
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Legal	ComplianceQuality	&	Accountability Security	&	PrivacyMetadata	Management Master	Data	Management
IT	Operations Business	StakeholdersBI	Competence	Center
Un-/Semi- structured	
Data
Structured
Data
Master	&	Reference
Data
Machine	Data
Content
Services	(Push)Connectors	(Pull)
StreamBatch/Bulk
IncrementalFull
Raw	Data	at	Rest
Standardized	Data	at	Rest
Optimized	Data	at	Rest
Data	Lab	(Sandbox)
Data	Refinery/Factory
Virtualization
Raw	Data	in	Motion
Standardized	Data	 in	Motion
Optimized	Data	 in	Motion
Query
Service	/	API
Search
Information	Services
Data	Science	
Tools
Dashboard
Prebuild	&	
AdHoc BI	Assets
Advanced	Analysis	
Tools
6
Big Data Ecosystem – many choices ….
09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals7
Top 8 Laws of Big Data
1. The faster you analyze your data, the greater its predictive value
2. Maintain one copy of your data, not dozens
3. Use more diverse data, not just more data
4. Data has value far beyond what you originally anticipate
5. Plan for exponential growth
6. Solve a real pain point
7. Put data and humans together to get the most insight
8. Big Data is transforming business the same way IT did
09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals
Source:	thebigdatagroup.com
8
Data Breaches
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
http://www.Conjur.net/breache
9
Data Breaches
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Verizon Data Breache Investigation Report
89% of breaches had a financial or
espionage motive
No locale, industry or organization is
bulletproof when it comes to the
compromise of data
New vulnerabilities come out every day
63% of confirmed data breaches involved
weak, default or stolen passwords.
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
10
Data Breaches
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Verizon Data Breache Investigation Report
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
11
Motivation for Privacy & Security in BigData
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
The bigger your data, the bigger the target
Data theft is a rampant and growing area of crime
Stricter Data Protection bushed by regulations
The only real way to save money and keep security costs low is to take preventive
steps to avoid common vulnerabilities and to minimize their impact.
care must be taken at every step of a big data project to ensure you don’t stumble
into pitfalls which could lead to wasted time and money, or even legal trouble.
12
Top Ten Big Data Security & Privacy Challenges (CSA)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
1. Secure computations in distributed
programming frameworks
2. Security best practices for non-
relational data stores
3. Secure data storage and
transactions logs
4. End-point input validation/filtering
5. Real-Time Security Monitoring
6. Scalable and composable privacy-
preserving data mining and
analytics
7. Cryptographically enforced data
centric security
8. Granular access control
9. Granular audits
10.Data Provenance
13
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Top Ten Big Data Security & Privacy Challenges (CSA)
https://cloudsecurityalliance.org/media/news/csa-releases-the-expanded-top-ten-big-data-security-privacy-challenges/
14
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Privacy
&
Data Protection Regulations
15
„Privacy“ vs “Data Protection”?
BD-PSF - BigData Privacy & Security Fundamentals20.06.2016
Is there a Difference?
Yes:
Country specific (US=Privacy ¦ EU = Data Protection)
Data Protection: Protect against unauthorised access
Data Privacy: authorized Access
Tecnical vs Legal
when does „Privacy“ apply?
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Whenever data is:
Collected
Processed
Stored
Which...
… relates to a living individual person who can be identified by that data.
In “Data Protection” Regulations:
“personal identifiable information” (PII)
“sensitive personal information” (SPI)
17
Personally Identifiable Information (PII)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
… means data which relate to a living individual who can be identified
from those data, or
from those data and other information which is in the possession of the data
controller,
and includes any expression of opinion about the individual and any indication
of the intentions of the data controller or any other person in respect of the
individual.
18
“Sensitive Personal Information” (SPI)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
… is PII data, consisting of Information as to:
the racial or ethnic origin of the data subject,
his political opinions,
his religious beliefs or other beliefs of a similar nature,
whether he is a member of a trade union (within the meaning of the Trade Union and
Labour Relations (Consolidation) Act 1992),
his physical or mental health or condition,
his sexual life,
the commission or alleged commission by him of any offence
19
National Data Protection Regulations
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
DE, AT and CH have similar national Data Protection regulations
(BDSG / DSG)
Regulates protection of the persons privacy
Data protection principles must be met
Transfer to 3rd Party only with legal contract regulating the use of PII Data.
Fines are up to 300000 EUR, if not comply with law
20
National Data Protection Regulations
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Data protection principles
Fair and lawful
Purposes
Adequacy not excessively
Accuracy
Retention
Rights of the Person
Security (Technical & Organisational Measures - TOM)
Transfer only with adequate level of protection
https://ico.org.uk/for-organisations/guide-to-data-protection/data-protection-principles/
21
EU GDPR – General Data Protection Regulation
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
A single law, the General Data Protection Regulation shall unify data protection
within the European Union.
As a regulation it directly imposes a uniform data security law on all EU members.
The regulation aims to enhance privacy and strengthen data protection rights for
EU citizens.
Agreed on may 2016 – Affective Mid 2018
22
EU GDPR – Key facts
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Businesses not in EU still
have to comply if data from
EU Citizen is processed
Appointment of a DPO will be
mandatory
Mandatory Privacy Risk
impact assessment (PIA)
Data Breach Notification
requirements
Data Minimization
(right to erasure)
Data security
(integrity & confidentiality)
Data Processors (Provider) have
direct legal obligations)
Privacy by design
(compliance with the principals of
data protection)
Must “implement appropriate
technical and organisational
measures” to ensure
GDPR compliance
Fines	up	to	20.000.000	EUR	or	
4%	of	companies	annual	turnover
23
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Privacy by Design (enisa)
24
Privacy by Design (enisa)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.201625
Privacy by Design (enisa)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
https://www.enisa.europa.eu/publications/big-data-protection
26
Is there not a conflict?
TE 09.2016 - BigData Privacy & Security Fundamentals27 09.09.2016
8 Laws of Big Data
1. Faster Analyzation
2. Maintain one copy, not dozens
3. more diverse data
4. Data has value far beyond…
5. Plan for exponential growth
6. Solve a real pain point
7. Put data and humans together to
get the most insight
8. Big Data is transforming business
Privacy by design
1. Minimize
2. Hide
3. Separate
4. Aggregate
5. Inform
6. Control
7. Enforce
8. Demonstrate
Is there not a conflict?
TE 09.2016 - BigData Privacy & Security Fundamentals28 09.09.2016
8 Laws of Big Data
1. Faster Analyzation
2. Maintain one copy, not dozens
3. more diverse data
4. Data has value far beyond…
5. Plan for exponential growth
6. Solve a real pain point
7. Put data and humans together to
get the most insight
8. Big Data is transforming business
Privacy by design
1. Minimize
2. Hide
3. Separate
4. Aggregate
5. Inform
6. Control
7. Enforce
8. Demonstrate
Is there not a conflict?
TE 09.2016 - BigData Privacy & Security Fundamentals29 09.09.2016
8 Laws of Big Data
1. Faster Analyzation
2. Maintain one copy, not dozens
3. more diverse data
4. Data has value far beyond…
5. Plan for exponential growth
6. Solve a real pain point
7. Put data and humans together to
get the most insight
8. Big Data is transforming business
Privacy by design
1. Minimize
2. Hide
3. Separate
4. Aggregate
5. Inform
6. Control
7. Enforce
8. Demonstrate
Is there not a conflict?
TE 09.2016 - BigData Privacy & Security Fundamentals30 09.09.2016
8 Laws of Big Data
1. Faster Analyzation
2. Maintain one copy, not dozens
3. more diverse data
4. Data has value far beyond…
5. Plan for exponential growth
6. Solve a real pain point
7. Put data and humans together to
get the most insight
8. Big Data is transforming business
Privacy by design
1. Minimize
2. Hide
3. Separate
4. Aggregate
5. Inform
6. Control
7. Enforce
8. Demonstrate
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Security
(Information Security)
31
Security controls
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Top 10 best practices to enhance security and privacy of BigData (CSA):
1. Authorize access to files by predefined security policy
2. Protect data by data encryption while at rest
3. Implement Policy Based Encryption System (PBES)
4. Use antivirus and malware protection systems at endpoints
5. Use big data analytics to detect anomalous connections to cluster
6. Implement privacy preserving analytics
7. Consider use of partial homomorphic encryption schemes
8. Implement fine grained access controls
9. Provide timely access to audit information
10.Provide infrastructure authentication mechanisms
https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Comment_on_Big_Data_Future_of_Privacy.pdf
32
Mitigation measures and good practices (ensia)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Strong and scalable encryption
Encrypt data in transit and at rest, to ensure data confidentiality and integrity.
Ensure proper encryption key management solution, considering the vast amount of
devices to cover.
Consider the timeframe for which the data should be kept - data protection regulation
might require that you dispose of some data, due to its nature after certain period of
time.
Design databases with confidentiality in mind – for example, any confidential data
could be contained in separate fields, so that they can be easily filtered out and/or
encrypted.
33
Mitigation measures and good practices (ensia)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Application security
Use regular security testing procedures to re-assure the level of security, specially
after patches or functionality changes.
Ensure tamper resistant devices to avoid misuse.
Ensure internal security testing procedures for new and updated components are
carried out regularly; if it is not possible third party evaluations, audits and
certification are key elements for the confidence and trust in products and actors.
Ensure procurement policies cover purchasing from authentic suppliers.
34
Mitigation measures and good practices (ensia)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Standards and Certification
Use devices which comply with desired security standards.
Ensure obtained certification relates to the use of Big Data.
Secure use of Cloud in Big Data
Ensure Big Data is included in the risk assessment for Cloud.
Ensure proper Service Level Agreements have been adopted.
Ensure proper resource isolation and exit strategies have been negotiated
35
Mitigation measures and good practices (ensia)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Source filtering
Use devices with authentication capabilities to ensure that validation of endpoint
sources is possible
Assign confidence levels on the endpoint sources
Re-evaluate confidence levels of the endpoints regularly, specially after patches
or changes in firmware
If confidence in endpoint source
36
Mitigation measures and good practices (ensia)
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Access control and authentication
Use authentication and authorization to ensure that Big Data queries are executed
by authorized users and entities only
Use components in the Big Data system that follow same security standards to
maintain the desired level of security
Big Data monitoring and logging
Enable logging on nodes participating in the Big Data computation
Enable logging on databases (relational or not) , as well as Big Data applications
Detect and prevent modification of logs
Regularly test the restoration of Big Data backups considering the vast amount of
data being used in the system
37
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Putting it together
38
Putting it Together
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Privacy & Security an important
subject
Each BigData Project has to
take Security into account
As earlier as better – later
changes are costive
New EU-GDPR changes
importance significant
(and also the risk not to comply)
Traditional security controls apply
also to BigData, but might be
challenging
Security Standards for BigData are
slowly getting established
We have to look closely to
technology vendors and their
functionalities…
compliance requirements might
affect the vendor selection
39
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.201640
Big Data &
Data Science
TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016
Advanced Analytics
§ Data Mining
§ Semantic Web
§ Visualisierung
Big Data & Data Scientist
Trainings
Big Data Consulting &
Managed Services
Large & Speedy Data
§ Hadoop Ecosystem
§ NoSQL DBs
§ Event Hubs & Streaming Analytics
§ Unified Query (RDBMS ó Big Data)
§ DWH Archive
§ Internet of Things
Big I Data I Warehouse
§ Konvergenz BI & Big Data
§ LDW Logical Data Warehouse
Big Data Privacy & Security
41
Session Feedback – now
TE 09.2016 - BigData Privacy & Security Fundamentals42 09.09.2016
Please use the Trivadis Events mobile app to give feedback on each session
Use "My schedule" if you have registered for a session
Otherwise use "Agenda" and the search function
If the mobile app does not work (or if you have a Windows smartphone), use your
smartphone browser
– URL: http://trivadis.quickmobileplatform.eu/
– User name: <your_loginname> (such as “svv”)
– Password: sent by e-mail...
09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals43

More Related Content

What's hot

Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR ComplianceDATAVERSITY
 
Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Sagara Gunathunga
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019Ulf Mattsson
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyIshay Tentser
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyMicrosoft Österreich
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slidesExponential_e
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
 

What's hot (20)

Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Beginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) JourneyBeginning your General Data Protection Regulation (GDPR) Journey
Beginning your General Data Protection Regulation (GDPR) Journey
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slides
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 

Viewers also liked

Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM Analytics
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Data Con LA
 
Global bigdata conf_01282013
Global bigdata conf_01282013Global bigdata conf_01282013
Global bigdata conf_01282013HPCC Systems
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big dataUlf Mattsson
 
Language Technologies for Big Data – A Strategic Agenda for the Multilingual ...
Language Technologies for Big Data – A Strategic Agenda for the Multilingual ...Language Technologies for Big Data – A Strategic Agenda for the Multilingual ...
Language Technologies for Big Data – A Strategic Agenda for the Multilingual ...Georg Rehm
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the lawKarlos Svoboda
 
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of EconomicsEnergy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of EconomicsBritish Embassy Paris
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...Micro Focus
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 
A Quick Tour of OpenRefine
A Quick Tour of OpenRefineA Quick Tour of OpenRefine
A Quick Tour of OpenRefineTony Hirst
 
Transforming ISV's to Azure
Transforming ISV's to AzureTransforming ISV's to Azure
Transforming ISV's to AzureTrivadis
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 

Viewers also liked (20)

Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
Big data security
Big data securityBig data security
Big data security
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Global bigdata conf_01282013
Global bigdata conf_01282013Global bigdata conf_01282013
Global bigdata conf_01282013
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
 
Language Technologies for Big Data – A Strategic Agenda for the Multilingual ...
Language Technologies for Big Data – A Strategic Agenda for the Multilingual ...Language Technologies for Big Data – A Strategic Agenda for the Multilingual ...
Language Technologies for Big Data – A Strategic Agenda for the Multilingual ...
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the law
 
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of EconomicsEnergy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Masters in Social Work (MSW)
Masters in Social Work (MSW)Masters in Social Work (MSW)
Masters in Social Work (MSW)
 
A Quick Tour of OpenRefine
A Quick Tour of OpenRefineA Quick Tour of OpenRefine
A Quick Tour of OpenRefine
 
Transforming ISV's to Azure
Transforming ISV's to AzureTransforming ISV's to Azure
Transforming ISV's to Azure
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Why Data Security is Important
Why Data Security is ImportantWhy Data Security is Important
Why Data Security is Important
 

Similar to Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian van Keulen

Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationWatchful Software
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Amazon Web Services
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Driven Innovation
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Finsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webFinsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webinnov-acts-ltd
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Impact on e-commerce of the GDPR- Etrade Summit 2016
Impact on e-commerce of the GDPR- Etrade Summit 2016Impact on e-commerce of the GDPR- Etrade Summit 2016
Impact on e-commerce of the GDPR- Etrade Summit 2016Bart Van Den Brande
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2Paul Richards
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2Keith Purves
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.James Seville
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 

Similar to Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian van Keulen (20)

Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Business with Big data
Business with Big dataBusiness with Big data
Business with Big data
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Finsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webFinsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4web
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Impact on e-commerce of the GDPR- Etrade Summit 2016
Impact on e-commerce of the GDPR- Etrade Summit 2016Impact on e-commerce of the GDPR- Etrade Summit 2016
Impact on e-commerce of the GDPR- Etrade Summit 2016
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 

More from Trivadis

Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...
Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...
Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...Trivadis
 
Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...
Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...
Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...Trivadis
 
Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)
Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)
Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)Trivadis
 
Azure Days 2019: Master the Move to Azure (Konrad Brunner)
Azure Days 2019: Master the Move to Azure (Konrad Brunner)Azure Days 2019: Master the Move to Azure (Konrad Brunner)
Azure Days 2019: Master the Move to Azure (Konrad Brunner)Trivadis
 
Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...
Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...
Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...Trivadis
 
Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)
Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)
Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)Trivadis
 
Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...
Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...
Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...Trivadis
 
Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...
Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...
Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...Trivadis
 
Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...
Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...
Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...Trivadis
 
Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...
Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...
Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...Trivadis
 
TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...
TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...
TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...Trivadis
 
TechEvent 2019: Oracle Database Appliance M/L - Erfahrungen und Erfolgsmethod...
TechEvent 2019: Oracle Database Appliance M/L - Erfahrungen und Erfolgsmethod...TechEvent 2019: Oracle Database Appliance M/L - Erfahrungen und Erfolgsmethod...
TechEvent 2019: Oracle Database Appliance M/L - Erfahrungen und Erfolgsmethod...Trivadis
 
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - TrivadisTechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - TrivadisTrivadis
 
TechEvent 2019: Trivadis & Swisscom Partner Angebote; Konrad Häfeli, Markus O...
TechEvent 2019: Trivadis & Swisscom Partner Angebote; Konrad Häfeli, Markus O...TechEvent 2019: Trivadis & Swisscom Partner Angebote; Konrad Häfeli, Markus O...
TechEvent 2019: Trivadis & Swisscom Partner Angebote; Konrad Häfeli, Markus O...Trivadis
 
TechEvent 2019: DBaaS from Swisscom Cloud powered by Trivadis; Konrad Häfeli ...
TechEvent 2019: DBaaS from Swisscom Cloud powered by Trivadis; Konrad Häfeli ...TechEvent 2019: DBaaS from Swisscom Cloud powered by Trivadis; Konrad Häfeli ...
TechEvent 2019: DBaaS from Swisscom Cloud powered by Trivadis; Konrad Häfeli ...Trivadis
 
TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...
TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...
TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...Trivadis
 
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...Trivadis
 
TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...
TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...
TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...Trivadis
 
TechEvent 2019: Vom Rechenzentrum in die Oracle Cloud - Übertragungsmethoden;...
TechEvent 2019: Vom Rechenzentrum in die Oracle Cloud - Übertragungsmethoden;...TechEvent 2019: Vom Rechenzentrum in die Oracle Cloud - Übertragungsmethoden;...
TechEvent 2019: Vom Rechenzentrum in die Oracle Cloud - Übertragungsmethoden;...Trivadis
 
TechEvent 2019: The sleeping Power of Data; Eberhard Lösch - Trivadis
TechEvent 2019: The sleeping Power of Data; Eberhard Lösch - TrivadisTechEvent 2019: The sleeping Power of Data; Eberhard Lösch - Trivadis
TechEvent 2019: The sleeping Power of Data; Eberhard Lösch - TrivadisTrivadis
 

More from Trivadis (20)

Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...
Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...
Azure Days 2019: Azure Chatbot Development for Airline Irregularities (Remco ...
 
Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...
Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...
Azure Days 2019: Trivadis Azure Foundation – Das Fundament für den ... (Nisan...
 
Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)
Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)
Azure Days 2019: Business Intelligence auf Azure (Marco Amhof & Yves Mauron)
 
Azure Days 2019: Master the Move to Azure (Konrad Brunner)
Azure Days 2019: Master the Move to Azure (Konrad Brunner)Azure Days 2019: Master the Move to Azure (Konrad Brunner)
Azure Days 2019: Master the Move to Azure (Konrad Brunner)
 
Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...
Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...
Azure Days 2019: Keynote Azure Switzerland – Status Quo und Ausblick (Primo A...
 
Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)
Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)
Azure Days 2019: Grösser und Komplexer ist nicht immer besser (Meinrad Weiss)
 
Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...
Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...
Azure Days 2019: Get Connected with Azure API Management (Gerry Keune & Stefa...
 
Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...
Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...
Azure Days 2019: Infrastructure as Code auf Azure (Jonas Wanninger & Daniel H...
 
Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...
Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...
Azure Days 2019: Wie bringt man eine Data Analytics Plattform in die Cloud? (...
 
Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...
Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...
Azure Days 2019: Azure@Helsana: Die Erweiterung von Dynamics CRM mit Azure Po...
 
TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...
TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...
TechEvent 2019: Kundenstory - Kein Angebot, kein Auftrag – Wie Du ein individ...
 
TechEvent 2019: Oracle Database Appliance M/L - Erfahrungen und Erfolgsmethod...
TechEvent 2019: Oracle Database Appliance M/L - Erfahrungen und Erfolgsmethod...TechEvent 2019: Oracle Database Appliance M/L - Erfahrungen und Erfolgsmethod...
TechEvent 2019: Oracle Database Appliance M/L - Erfahrungen und Erfolgsmethod...
 
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - TrivadisTechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
 
TechEvent 2019: Trivadis & Swisscom Partner Angebote; Konrad Häfeli, Markus O...
TechEvent 2019: Trivadis & Swisscom Partner Angebote; Konrad Häfeli, Markus O...TechEvent 2019: Trivadis & Swisscom Partner Angebote; Konrad Häfeli, Markus O...
TechEvent 2019: Trivadis & Swisscom Partner Angebote; Konrad Häfeli, Markus O...
 
TechEvent 2019: DBaaS from Swisscom Cloud powered by Trivadis; Konrad Häfeli ...
TechEvent 2019: DBaaS from Swisscom Cloud powered by Trivadis; Konrad Häfeli ...TechEvent 2019: DBaaS from Swisscom Cloud powered by Trivadis; Konrad Häfeli ...
TechEvent 2019: DBaaS from Swisscom Cloud powered by Trivadis; Konrad Häfeli ...
 
TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...
TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...
TechEvent 2019: Status of the partnership Trivadis and EDB - Comparing Postgr...
 
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...
 
TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...
TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...
TechEvent 2019: Kundenstory - Vom Hauptmann zu Köpenick zum Polizisten 2020 -...
 
TechEvent 2019: Vom Rechenzentrum in die Oracle Cloud - Übertragungsmethoden;...
TechEvent 2019: Vom Rechenzentrum in die Oracle Cloud - Übertragungsmethoden;...TechEvent 2019: Vom Rechenzentrum in die Oracle Cloud - Übertragungsmethoden;...
TechEvent 2019: Vom Rechenzentrum in die Oracle Cloud - Übertragungsmethoden;...
 
TechEvent 2019: The sleeping Power of Data; Eberhard Lösch - Trivadis
TechEvent 2019: The sleeping Power of Data; Eberhard Lösch - TrivadisTechEvent 2019: The sleeping Power of Data; Eberhard Lösch - Trivadis
TechEvent 2019: The sleeping Power of Data; Eberhard Lösch - Trivadis
 

Recently uploaded

Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingsocarem879
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxTasha Penwell
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 

Recently uploaded (20)

Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 

Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian van Keulen

  • 1. BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN LAUSANNE MUNICH STUTTGART VIENNA ZURICH Big Data Privacy and Security Fundamentals Florian van Keulen Principal Consultant BDS – Cloud & Security
  • 2. TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Florian van Keulen Principal Consultant – Cloud & Security § Über 15 Jahre IT Erfahrung § Trivadis Sicherheitsbeauftragter (SiBe | Security Officer) § Disziplin Manager “Infrastructure Security” § Program Manager “Cloud Computing“ Erfahrung: § Security Konzept & Review, Azure Private Cloud Infrastructure & RemoteApp Services (Axpo Trading) § Securing Azure IoT Infrastructure & Azure deployment Automation (IWB) § Security Konzept Cloud Collaboration Platform Im Gesundheitswesen § Security Review RemoteAccess & VDI Umgebung, Privat Bank Spezialgebiet: § Cloud- und Infrastructure Security § Identity- und Access Management § Remote Access Lösungen § Cloud Sicherheitsberatung § Datenschutz und Informationssicherheitsmanagement § Sicherheitskonzeption und Analysen § Microsoft Azure Security Solutions …Neue Umgebungen bergen nicht nur Risiken, sondern auch Sicherheits-opportunitäten, wenn man damit richtig umzugehen weiss. Kritisch Hinterfragen, Umdenken, Verstehen und Adaptieren – BigData “sicher” nutzen! Florian v. Keulen Weiteres: § Zertifizierter IT-Sicherheitsbeauftragter § Cloud Risk Assessments § Cloud Readiness Assessments § IT-SiBe Tätigkeiten intern und für Kunden § Beratung für IAM und Identity Federation im Cloud Umfeld 2
  • 3. Agenda 1. BigData Privacy & Security - Challenges What is BigData | Data Breaches | Motivation | Top Chellanges 2. Privacy & Data Protection Regulation PII | EU-GDPR | Privacy by Design 3. Security (Information Security) Security Controls | Best Practices 4. Putting it together 09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals3
  • 4. TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 BigData Privacy & Security Challenges 4
  • 5. Big Data Definition (4 Vs) + Time to action ? – Big Data + Real-Time = Stream Processing Characteristics of Big Data: Its Volume, Velocity and Variety in combination 09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals5
  • 6. Data Acquisition Data Sources Governance Organisation Information Provisioning Consumer Data Management Trivadis Architecture Canvas for Analytical Applications TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Legal ComplianceQuality & Accountability Security & PrivacyMetadata Management Master Data Management IT Operations Business StakeholdersBI Competence Center Un-/Semi- structured Data Structured Data Master & Reference Data Machine Data Content Services (Push)Connectors (Pull) StreamBatch/Bulk IncrementalFull Raw Data at Rest Standardized Data at Rest Optimized Data at Rest Data Lab (Sandbox) Data Refinery/Factory Virtualization Raw Data in Motion Standardized Data in Motion Optimized Data in Motion Query Service / API Search Information Services Data Science Tools Dashboard Prebuild & AdHoc BI Assets Advanced Analysis Tools 6
  • 7. Big Data Ecosystem – many choices …. 09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals7
  • 8. Top 8 Laws of Big Data 1. The faster you analyze your data, the greater its predictive value 2. Maintain one copy of your data, not dozens 3. Use more diverse data, not just more data 4. Data has value far beyond what you originally anticipate 5. Plan for exponential growth 6. Solve a real pain point 7. Put data and humans together to get the most insight 8. Big Data is transforming business the same way IT did 09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals Source: thebigdatagroup.com 8
  • 9. Data Breaches TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 http://www.Conjur.net/breache 9
  • 10. Data Breaches TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Verizon Data Breache Investigation Report 89% of breaches had a financial or espionage motive No locale, industry or organization is bulletproof when it comes to the compromise of data New vulnerabilities come out every day 63% of confirmed data breaches involved weak, default or stolen passwords. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ 10
  • 11. Data Breaches TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Verizon Data Breache Investigation Report http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ 11
  • 12. Motivation for Privacy & Security in BigData TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 The bigger your data, the bigger the target Data theft is a rampant and growing area of crime Stricter Data Protection bushed by regulations The only real way to save money and keep security costs low is to take preventive steps to avoid common vulnerabilities and to minimize their impact. care must be taken at every step of a big data project to ensure you don’t stumble into pitfalls which could lead to wasted time and money, or even legal trouble. 12
  • 13. Top Ten Big Data Security & Privacy Challenges (CSA) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 1. Secure computations in distributed programming frameworks 2. Security best practices for non- relational data stores 3. Secure data storage and transactions logs 4. End-point input validation/filtering 5. Real-Time Security Monitoring 6. Scalable and composable privacy- preserving data mining and analytics 7. Cryptographically enforced data centric security 8. Granular access control 9. Granular audits 10.Data Provenance 13
  • 14. TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Top Ten Big Data Security & Privacy Challenges (CSA) https://cloudsecurityalliance.org/media/news/csa-releases-the-expanded-top-ten-big-data-security-privacy-challenges/ 14
  • 15. TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Privacy & Data Protection Regulations 15
  • 16. „Privacy“ vs “Data Protection”? BD-PSF - BigData Privacy & Security Fundamentals20.06.2016 Is there a Difference? Yes: Country specific (US=Privacy ¦ EU = Data Protection) Data Protection: Protect against unauthorised access Data Privacy: authorized Access Tecnical vs Legal
  • 17. when does „Privacy“ apply? TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Whenever data is: Collected Processed Stored Which... … relates to a living individual person who can be identified by that data. In “Data Protection” Regulations: “personal identifiable information” (PII) “sensitive personal information” (SPI) 17
  • 18. Personally Identifiable Information (PII) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 … means data which relate to a living individual who can be identified from those data, or from those data and other information which is in the possession of the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual. 18
  • 19. “Sensitive Personal Information” (SPI) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 … is PII data, consisting of Information as to: the racial or ethnic origin of the data subject, his political opinions, his religious beliefs or other beliefs of a similar nature, whether he is a member of a trade union (within the meaning of the Trade Union and Labour Relations (Consolidation) Act 1992), his physical or mental health or condition, his sexual life, the commission or alleged commission by him of any offence 19
  • 20. National Data Protection Regulations TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 DE, AT and CH have similar national Data Protection regulations (BDSG / DSG) Regulates protection of the persons privacy Data protection principles must be met Transfer to 3rd Party only with legal contract regulating the use of PII Data. Fines are up to 300000 EUR, if not comply with law 20
  • 21. National Data Protection Regulations TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Data protection principles Fair and lawful Purposes Adequacy not excessively Accuracy Retention Rights of the Person Security (Technical & Organisational Measures - TOM) Transfer only with adequate level of protection https://ico.org.uk/for-organisations/guide-to-data-protection/data-protection-principles/ 21
  • 22. EU GDPR – General Data Protection Regulation TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 A single law, the General Data Protection Regulation shall unify data protection within the European Union. As a regulation it directly imposes a uniform data security law on all EU members. The regulation aims to enhance privacy and strengthen data protection rights for EU citizens. Agreed on may 2016 – Affective Mid 2018 22
  • 23. EU GDPR – Key facts TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Businesses not in EU still have to comply if data from EU Citizen is processed Appointment of a DPO will be mandatory Mandatory Privacy Risk impact assessment (PIA) Data Breach Notification requirements Data Minimization (right to erasure) Data security (integrity & confidentiality) Data Processors (Provider) have direct legal obligations) Privacy by design (compliance with the principals of data protection) Must “implement appropriate technical and organisational measures” to ensure GDPR compliance Fines up to 20.000.000 EUR or 4% of companies annual turnover 23
  • 24. TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Privacy by Design (enisa) 24
  • 25. Privacy by Design (enisa) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.201625
  • 26. Privacy by Design (enisa) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 https://www.enisa.europa.eu/publications/big-data-protection 26
  • 27. Is there not a conflict? TE 09.2016 - BigData Privacy & Security Fundamentals27 09.09.2016 8 Laws of Big Data 1. Faster Analyzation 2. Maintain one copy, not dozens 3. more diverse data 4. Data has value far beyond… 5. Plan for exponential growth 6. Solve a real pain point 7. Put data and humans together to get the most insight 8. Big Data is transforming business Privacy by design 1. Minimize 2. Hide 3. Separate 4. Aggregate 5. Inform 6. Control 7. Enforce 8. Demonstrate
  • 28. Is there not a conflict? TE 09.2016 - BigData Privacy & Security Fundamentals28 09.09.2016 8 Laws of Big Data 1. Faster Analyzation 2. Maintain one copy, not dozens 3. more diverse data 4. Data has value far beyond… 5. Plan for exponential growth 6. Solve a real pain point 7. Put data and humans together to get the most insight 8. Big Data is transforming business Privacy by design 1. Minimize 2. Hide 3. Separate 4. Aggregate 5. Inform 6. Control 7. Enforce 8. Demonstrate
  • 29. Is there not a conflict? TE 09.2016 - BigData Privacy & Security Fundamentals29 09.09.2016 8 Laws of Big Data 1. Faster Analyzation 2. Maintain one copy, not dozens 3. more diverse data 4. Data has value far beyond… 5. Plan for exponential growth 6. Solve a real pain point 7. Put data and humans together to get the most insight 8. Big Data is transforming business Privacy by design 1. Minimize 2. Hide 3. Separate 4. Aggregate 5. Inform 6. Control 7. Enforce 8. Demonstrate
  • 30. Is there not a conflict? TE 09.2016 - BigData Privacy & Security Fundamentals30 09.09.2016 8 Laws of Big Data 1. Faster Analyzation 2. Maintain one copy, not dozens 3. more diverse data 4. Data has value far beyond… 5. Plan for exponential growth 6. Solve a real pain point 7. Put data and humans together to get the most insight 8. Big Data is transforming business Privacy by design 1. Minimize 2. Hide 3. Separate 4. Aggregate 5. Inform 6. Control 7. Enforce 8. Demonstrate
  • 31. TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Security (Information Security) 31
  • 32. Security controls TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Top 10 best practices to enhance security and privacy of BigData (CSA): 1. Authorize access to files by predefined security policy 2. Protect data by data encryption while at rest 3. Implement Policy Based Encryption System (PBES) 4. Use antivirus and malware protection systems at endpoints 5. Use big data analytics to detect anomalous connections to cluster 6. Implement privacy preserving analytics 7. Consider use of partial homomorphic encryption schemes 8. Implement fine grained access controls 9. Provide timely access to audit information 10.Provide infrastructure authentication mechanisms https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Comment_on_Big_Data_Future_of_Privacy.pdf 32
  • 33. Mitigation measures and good practices (ensia) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Strong and scalable encryption Encrypt data in transit and at rest, to ensure data confidentiality and integrity. Ensure proper encryption key management solution, considering the vast amount of devices to cover. Consider the timeframe for which the data should be kept - data protection regulation might require that you dispose of some data, due to its nature after certain period of time. Design databases with confidentiality in mind – for example, any confidential data could be contained in separate fields, so that they can be easily filtered out and/or encrypted. 33
  • 34. Mitigation measures and good practices (ensia) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Application security Use regular security testing procedures to re-assure the level of security, specially after patches or functionality changes. Ensure tamper resistant devices to avoid misuse. Ensure internal security testing procedures for new and updated components are carried out regularly; if it is not possible third party evaluations, audits and certification are key elements for the confidence and trust in products and actors. Ensure procurement policies cover purchasing from authentic suppliers. 34
  • 35. Mitigation measures and good practices (ensia) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Standards and Certification Use devices which comply with desired security standards. Ensure obtained certification relates to the use of Big Data. Secure use of Cloud in Big Data Ensure Big Data is included in the risk assessment for Cloud. Ensure proper Service Level Agreements have been adopted. Ensure proper resource isolation and exit strategies have been negotiated 35
  • 36. Mitigation measures and good practices (ensia) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Source filtering Use devices with authentication capabilities to ensure that validation of endpoint sources is possible Assign confidence levels on the endpoint sources Re-evaluate confidence levels of the endpoints regularly, specially after patches or changes in firmware If confidence in endpoint source 36
  • 37. Mitigation measures and good practices (ensia) TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Access control and authentication Use authentication and authorization to ensure that Big Data queries are executed by authorized users and entities only Use components in the Big Data system that follow same security standards to maintain the desired level of security Big Data monitoring and logging Enable logging on nodes participating in the Big Data computation Enable logging on databases (relational or not) , as well as Big Data applications Detect and prevent modification of logs Regularly test the restoration of Big Data backups considering the vast amount of data being used in the system 37
  • 38. TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Putting it together 38
  • 39. Putting it Together TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Privacy & Security an important subject Each BigData Project has to take Security into account As earlier as better – later changes are costive New EU-GDPR changes importance significant (and also the risk not to comply) Traditional security controls apply also to BigData, but might be challenging Security Standards for BigData are slowly getting established We have to look closely to technology vendors and their functionalities… compliance requirements might affect the vendor selection 39
  • 40. TE 09.2016 - BigData Privacy & Security Fundamentals09.09.201640
  • 41. Big Data & Data Science TE 09.2016 - BigData Privacy & Security Fundamentals09.09.2016 Advanced Analytics § Data Mining § Semantic Web § Visualisierung Big Data & Data Scientist Trainings Big Data Consulting & Managed Services Large & Speedy Data § Hadoop Ecosystem § NoSQL DBs § Event Hubs & Streaming Analytics § Unified Query (RDBMS ó Big Data) § DWH Archive § Internet of Things Big I Data I Warehouse § Konvergenz BI & Big Data § LDW Logical Data Warehouse Big Data Privacy & Security 41
  • 42. Session Feedback – now TE 09.2016 - BigData Privacy & Security Fundamentals42 09.09.2016 Please use the Trivadis Events mobile app to give feedback on each session Use "My schedule" if you have registered for a session Otherwise use "Agenda" and the search function If the mobile app does not work (or if you have a Windows smartphone), use your smartphone browser – URL: http://trivadis.quickmobileplatform.eu/ – User name: <your_loginname> (such as “svv”) – Password: sent by e-mail...
  • 43. 09.09.2016 TE 09.2016 - BigData Privacy & Security Fundamentals43