BigDataRevealed Secure/Sequester and Encrypt

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
Advertisements

Advanced Database Projects In Access © Hodder Education 2008 Access Projects – Problem Specification.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Data Quality David Loshin Knowledge Integrity Inc.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Introduction (Pendahuluan)  Information Security.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
NetService Cardholder Tutorial GE Corporate Payment Services 4246 South Riverboat Road Salt Lake City, Utah Copyright Information.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
APAN Group Owner Training. APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities.
Executive Invitation – Oracle Data Finder Service Oracle Corporation.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Electronic Security Initiative 2005 Security Assessment & Security Services 23 August 2005.
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
What is a database? (a supplement, not a substitute for Chapter 1…) some slides copied/modified from text Collection of Data? Data vs. information Example:
Identity Finder Client
Azure SQL Database Updates
Combating Identity Fraud In A Virtual World
Protecting a Tsunami of Data in Hadoop
Presented by Rob Carver
3.6 Fundamentals of cyber security
SNS COLLEGE OF TECHNOLOGY
Hotspot Shield Protect Your Online Identity
What Does GDPR mean for you
Common Methods Used to Commit Computer Crimes
Azure Information Protection Strategy and Roadmap
Secure Software Confidentiality Integrity Data Security Authentication
Microsoft 365 Get help with regulatory compliance
Smartcrypt Data Discovery
Extending classification ,labeling , and protection to 3rd party applications Kartik Microsoft Tony Digital Guardian Amit Cohen.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
General Data Protection Regulation
Our Solutions Focus: Threat Detection and Investigation
Understanding best practices in classifying sensitive data
Electronic Commerce Payment Systems
Forensics Week 11.
Microsoft Corporation
Choosing the Discovery Model Martin Forsberg
Chair of Tech Committee, BetterGrids.org
Incident Reporting Webinar Begins at 12.30
EU GDPR a Cyber Security Perspective
Data Quality By Suparna Kansakar.
The new data protection rules
re:SearchTX - Providing Clarity
GDPR (General Data Protection Regulation)
Cyber Security - Protecting Information
Chapter 1: Information Security Fundamentals
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Data Warehousing Data Mining Privacy
Electronic Commerce Payment Systems
Make it real: Help your customers comply with the GDPR
Symmetric Key Distribution
Security in SharePoint and Teams with DLP, IRM, and AIP
ENCRYPTION with Oracle Advanced Security
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

BigDataRevealed Secure/Sequester and Encrypt You have to take data privacy seriously Unfortunately your big data environment makes this difficult   Cyber-Threats are serious. It’s no longer a matter of if your organization will have to thwart off a cyber-attack, it’s when it will happen. Like most organizations, the big data environment has become a critical part of the arsenal to analyze information, and the weakest link in security is normally the big data environment. Because of recent cyber-threats, governments have begun passing legislation to force organizations to take protecting the privacy information they have been entrusted with seriously. The first legislations are GDPR, planned to go live in May, 2018 with similar legislations expected elsewhere. Fortunately, we have a solution to protect Privacy information that finds its way to your big data environment. Please read on for some details about our approach. BigDataRevealed Secure/Sequester and Encrypt By Steven Meister 847-791-7838 EUGDPRWebinars@bigdatarevealed.com

BigDataRevealed uses the Intelligent Catalog Our first product was the intelligent catalog, which is the base from which the Secure/Sequester and Encrypt (SSE) process we use to protect information in your big data environment is derived The Intelligent Catalog is the missing directory for Big Data that also has analytic capabilities. We use these analytic capabilities to identify patterns in registered files and streaming data to protect privacy information entrusted to you that should not be unprotected in your big data environment.

How it works Data files and streams are registered to the SSE facility This registration process defines what to protect Patterns that are not privacy information are registered as false positives (i.e., vendor numbers, invoice numbers, etc. that have similar patterns to social security or credit card numbers). When files and streams are presented to the big data environment, the intelligent catalog goes to work It stores the identity of the file or stream and stores metadata about the file or stream It uses the rules written about the patterns and determines if the patterns are on the false positive list Real patterns are passed to the SSE facility for corrective action The SSE engine goes to work to sequester privacy information, encrypt the privacy information in the big data environment and secure the encryption keys into a protected area.

Use the intelligent catalog to identify potential PII issues in incoming streams As BigDataRevealed does for static data at rest in HDFS and Hbase, BDR uses its same BDR-Libraries and engine to discover patterns of sensitive data and applies its SecureSequester/Encryption methods to incoming streams of data and encrypts the PII before it ever gets written into your Data Lake. 1 The producer is the management workbench used to configure the streams that should be interrogated by BigDataRevealed’s SecureSequester 2 The patterns in the streams are identified and false positives are eliminated, leaving what is potentially exposed Personal Identifiable Information (PII) 3 4 The SecureSequester capabilities of BigDataRevealed’s Intelligent Catalog then go to work to encrypt PII data and sequester the keys necessary to reveal PII values

How the potential issues are reviewed BigDataRevealed and its Intelligent Catalog are available in its Executive Summary as well as its Data Scientist Toolkits Graphical Interface. The Intelligent Catalog can also be accessed by most any other third party tools.   Users can view PII by type of Business Classification such as email, names, addresses, SSN, Banking Information, Credit Cards and a limitless amount of PII Discoveries. With the Use of Drilling, Users can see the high-level summary counts of PII by category as well as drill down to a single system source of record for a PII exposure. The BDR Intelligent Catalog is collaborative and available to other Metadata tools/repositories and can be exported as well as can import Catalog and metadata. How someone with appropriate clearance would use encrypted data: Collaborative, sharable though controlled by Users Roles Based Authority

In Summary BigDataRevealed Steps BigDataRevealed Discovery BigDataRevealed Intelligence Catalog & Metadata SecureSequester & Encrypt Validate Remediation

BigDataRevealed Repeatable, Collaborative Application Process Select HDFS or Streaming Data Establish Stream or Hadoop Connection Patterns to be Discovered Use BDR-Lib and or User Defined Intelligent Catalog View the Metadata and Catalog Remediation Decide what PII to Encrypt and what false positives to ignore Analyze Outlier Anomalies

BigDataRevealed Executive Summary screen and the SecureSequester/Encryption Interface