Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.

Slides:



Advertisements
Similar presentations
Tanmoy Sarkar, Johnny Wong, Samik Basu Response to Collaborative Attacks Against Network Vulnerability Iowa State University, Department Of Computer Science.
Advertisements

4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
South Carolina Cyber.
Boost your network security with NETASQ Vulnerability Manager.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
(Geneva, Switzerland, September 2014)
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Copyright © 2012, SAS Institute Inc. All rights reserved. BIG DATA ANALYTICS FOR DEVELOPMENT.
Copyright © 2009, SAS Institute Inc. All rights reserved. Creating a Practical Social Media Strategy for Authors, Customers, and Colleagues: A SAS Publishing.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Ohio Digital Government Summit Disease Surveillance (Homeland Security session) October 5, 2004 Rana Sen Deloitte Consulting LLP.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Network security Product Group 2 McAfee Network Security Platform.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Threat Management Service October Crypteia Networks 2 Awards PCCW Global acquired Crypteia Networks in 2014 Crypteia Networks was founded as a Security-as-a-
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Visual Analytics for Improved Management of Transportation Operations Jesus A. Martinez Southwest Research Institute Transpo October 2012.
Copyright © 2015, SAS Institute Inc. All rights reserved. Business & Analytics unite VS.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Cyber security: Lithuanian National Regulatory Authority expertise in monitoring national networks resilience Dr. Rytis Rainys | rrt.lt at TAIEX Multi-beneficiary.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Protect your Digital Enterprise
IoT Security Part 2, The Malware
Information Security Program
Comprehensive Security and Compliance at an Affordable Price.
“Introduction to Azure Security Center”
Detection and Analysis of Threats to the Energy Sector (DATES)
Proactive Risk Management through Improved Situational Awareness
Security Automation Standards Landscape
StealthWatch: Network Visibility & Security Intelligence BATTLE CARD
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
Security Operations Without Going Blind
Join In Be Secure Presentation
How to Operationalize Big Data Security Analytics
Security Operations Without Going Blind
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Human (user) behavior patterns and analytics
Maintaining order and safety in a city is no small task
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
Presentation transcript:

Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014

Copyright © 2012, SAS Institute Inc. All rights reserved. The Govt Cyber threat Landscape : Be Afraid The US Department of Defense detected 300 Million network penetration attempts last year, up from 6 million in Yr The US Govt Accountability Office found in its survey that 23 of the 24 agencies surveyed did not have computer security protections in place Govt computer networks are constantly bombarded with cyber threats from sources around the world It is evidenced that, Govt departments sharing open data attracts more global attention on cyber threats The analytics approach to Cyber security….

Copyright © 2012, SAS Institute Inc. All rights reserved. Case Study: Undisclosed Govt Organization Situation: A government organization needed to coordinate and monitor the defense of its vast global networks 90 percent of the alerts were of a probing nature that did not require immediate action, a lot of valuable time was wasted on unnecessary investigations In addition, many network monitors produced huge volumes of data in different formats, and the dept did not have any way of doing historical analysis of data visualization on this massive threat data

Copyright © 2012, SAS Institute Inc. All rights reserved. Case Study: The challenge The organization asked SAS, “Can you…” Give us a real-time network defense system that automatically generates attack alerts when threat response actions are required, while also dramatically reducing the number of false positives? Pinpoint anomalous properties of network traffic, which would normally go undetected, as well as uncover hidden relationships and behavior patterns Aggregate, correlate and merge data from all our network monitoring devices and any other data sources so we could achieve complete network domain awareness

Copyright © 2012, SAS Institute Inc. All rights reserved. Case Study: The solution SAS developed a hybrid cyber security defense mechanism due to the global nature of access to the govt organization’s web channels

Copyright © 2012, SAS Institute Inc. All rights reserved. Case Study: The results Potential threats were recognized sooner than ever before Analysts were able to investigate incidents on a network view of data at greater speed Billions of rows, rapidly explored in seconds. Scalability to handle growing volumes of data Critical pain point of “Alert Prioritization” achieved

Copyright © 2012, SAS Institute Inc. All rights reserved. Thank you