Www.cloudsecurityalliance.org John Howie Big Data: Answering Questions and Solving Society’s Problems, but at What Cost?

Slides:



Advertisements
Similar presentations
Organizational Environment for Knowledge Management
Advertisements

Strategy to Increase ASME’s Global Impact Michael Michaud, MD Global Alliances Orlando, FL November 16, 2009.
1 Health Insurance Portability and Accountability Act of 1996 IS&C Expo October 16 & 17, 2002 John Wagner Governor’s Office of Technology.
Chapter 1 Marketing: The Art and Science of Satisfying Customers
OHT 4.1 © Marketing Insights Limited 2004 Chapter 4 E-environment.
ELECTRONIC BUSINESS ENVIRONMENT. Learning objectives Identify the different elements of the e-environment that impact on an organisation’s e-business.
Copyright © 2011 Cloud Security Alliance Keynote.
Copyright © 2012 Cloud Security Alliance Conference Announcements.
Digital public services and innovation
Achieving Assurance and Compliance in the Cloud Digital Government Cyber Security Conference Cheryl Wilner, CEO Bethesda Advanced Solutions Ronald Regan.
Ganguly & Associates July, Ganguly & Associates We add value to your business, practically 2 Ganguly & Associates Agenda  About Us  Service Offerings.
E-business Infrastructure
Software Certification for Electronic Health Records: The Certification Commission for Healthcare Information Technology (CCHIT) James J. Cimino, M.D.
Knowledge Networking: How Networks Influence Policy By Aly Z. Ramji.
1 SYS366 Week 1 - Lecture 2 How Businesses Work. 2 Today How Businesses Work What is a System Types of Systems The Role of the Systems Analyst The Programmer/Analyst.
Chapter 6Copyright ©2008 by South-Western, a division of Thomson Learning. All rights reserved 1 Learning Objectives: Chapter 6  1. Describe business.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Chapter One Introduction to Managerial Accounting COPYRIGHT © 2012 Nelson Education Ltd.
BIG DATA AND THE HEALTHCARE REVOLUTION FORD+SSPG 2014.
McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Michal Bodlák. Definition  An investment bank is a financial institution that assists: individuals, corporations and governments companies involved in.
Chapter 5 E-environment
Internet Use by the General Public Guidelines from the AVCC, Content, University IT Systems and the Internet provided framework for addressing copyright.
Marketing of Information Security Products. The business case for Information Security Management.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Copyright © 2011 Cloud Security Alliance Building Trust into the Next Generation of Information Technology.
Digital Economy New Challenges and Opportunities from the point of Information Security Ing. Petra Hochmannová – csirt.sk.
SMU Dedman School of Law September 29, Agenda Topics  Who is PaymentsNation?  Who Are The Other Players?  What is Happening in Payments?  Emerging.
Tracking Demographic Data of SC Performers Linda G. Blevins, Ph.D. Office of Basic Energy Sciences Office of Science, U.S. Department of Energy August.
Chapter 11 - Customer Relationship Management
BUSINESS WITH CONFIDENCEicaew.com © ICAEW 2015 IT and Accountants: A Partnership Made in Heaven? Kirstin Gillon, ICAEW IT Faculty Introduction by Christiana.
Learning Objective Chapter 3 The Marketing Research Industry and Research Ethics CHAPTER three The Marketing Research Industry and Research Ethics Copyright.
Copyright © 2011 Cloud Security Alliance Cloud Security Alliance Research & Roadmap Jim Reavis, Executive Director, CSA.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
Digital Agenda Unleashing the Potential of Cloud Computing in Europe Ken Ducatel Head of Unit DG Connect, Software and Services, Cloud 05 December 2012.
© Cloud Security Alliance, 2015 Wilco van Ginkel, Co-Chair BDWG.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
PowerPoint Presentations for Principles of Macroeconomics Sixth Canadian Edition by Mankiw/Kneebone/McKenzie Adapted for the Sixth Canadian Edition by.
Data Brokers, Our Secret Enemy By Andrew Herrera.
Business in the Free Enterprise Introduction to Business & Marketing.
Marketing research is the function that links the consumer, customer, and public to the marketer through information  identification,  collection, 
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
* * Chapter One Taking Risks and Making Profits within the Dynamic Business Environment Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights.
Global Edition Chapter 1 Analyzing the Marketing Environment.
LINKAGES BETWEEN INSTITUTIONS OF HE, VET AND LABOUR MARKET MR NIKOS IOANNOU.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
Introduction BIM Data Mining.
The Marketing Research Industry and Research Ethics
World Patent Ratings World Patent Ratings is a specialized rating agency and expert network focused on the standardization and objective measure of intangible.
2016 Cybersecurity Law If any one of these describes your company
Global Edition Chapter 3
Published: Aug 2017 Single User PDF: US$ 2500 No. of Pages: 499
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Funding a Start-up Venture
Who Uses Encryption? Module 7 Section 3.
CHAPTER three The Marketing Research Industry and Research Ethics
E-Commerce and Economic Forces
The Rise of Big Business
WorldWidePIN Corporation
Performance Indicator 4.08
MarketsandMarkets Presents Bare Metal Cloud Market size is estimated to grow from USD 0.87 Billion in 2016 to USD 4.71 Billion by 2021.
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

John Howie Big Data: Answering Questions and Solving Society’s Problems, but at What Cost?

Copyright © 2013 Cloud Security Alliance Chief Operating Officer, Cloud Security Alliance Visiting Research Professor and Research Associate, University of Arizona Visiting Professor, Edinburgh Napier University

Copyright © 2013 Cloud Security Alliance Big Data Example The Rise of Big Data Explosion of Data Sources Privacy Impact Government use of Big Data?

Copyright © 2013 Cloud Security Alliance Global, not-for-profit organization Building security best practices for next generation IT Research and Educational Programs Cloud Provider Certification User Certification Awareness and Marketing The globally authoritative source for Trust in the Cloud “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”

Copyright © 2013 Cloud Security Alliance Founded in 2009 Membership stats as of Feb ,000 individual members, 66 chapters globally 145 corporate members Major cloud providers, tech companies, infosec leaders, governments, financial institutions, retail, healthcare and more Offices in Seattle USA, Singapore, Heraklion Greece Over 30 research projects in 25 working groups Strategic partnerships with governments, research institutions, professional associations and industry

Copyright © 2013 Cloud Security Alliance Big Data Identifying scalable techniques for data-centric security and privacy problems Lead to crystallization of best practices for security and privacy in big data Help industry and government on adoption of best practices Establish liaisons with other organizations in order to coordinate the development of big data security and privacy standards Accelerate the adoption of novel research aimed to address security and privacy issues

Copyright © 2013 Cloud Security Alliance Target assigns every customer a Guest ID number, tied to their credit card, name, or address that becomes a bucket that stores a history of everything they’ve bought and any demographic information Target has collected from them or bought from other sources.

Copyright © 2013 Cloud Security Alliance Kryder’s Law By 2020, 2.5” drive with 14TB storage will cost $40 Disk Storage has kept pace with Moore’s Law Moore’s Law Most people consider it to mean that computing power will double every two years

Copyright © 2013 Cloud Security Alliance

Copyright © 2013 Cloud Security Alliance It is now cheaper to keep data than to delete it Increase in processing power allows us to analyze stored data in ways not done before You can use cloud computing to get (cheap) access to storage and processing power

Copyright © 2013 Cloud Security Alliance US, UK and other governments are publishing tax-payer funded data Intended for use by researchers, application developers and others No barrier to corporate use

Copyright © 2013 Cloud Security Alliance

Copyright © 2013 Cloud Security Alliance

Copyright © 2013 Cloud Security Alliance

Copyright © 2013 Cloud Security Alliance Immensely useful to sociologists and anthropologists today and in future Assuming data format can be understood Other researchers are finding use for datasets published by government Especially about government business transactions and interactions with citizens

Copyright © 2013 Cloud Security Alliance Many companies sell data Risks are often underplayed (or misunderstood) Steps are taken to anonymize or pseudonymize identities with varying levels of success

Copyright © 2013 Cloud Security Alliance

Copyright © 2013 Cloud Security Alliance

Copyright © 2013 Cloud Security Alliance 87% of Americans can be identified with three pieces of information: ZIP, DOB and sex

Copyright © 2013 Cloud Security Alliance American Diabetes Association released figures this year Direct cost of diabetes in US was $245B in % increase in five years from 2007 ($174B) Roughly 20% of healthcare spending Indirect cost of diabetes in economy was $68.6B What if Big Data could cut these costs?

Copyright © 2013 Cloud Security Alliance Anonymization and pseudonymization strategies need to be closely examined Identification may be possible when datasets are combined Consent to release private data should be obtained first Problem is that consent is often implied in contract Preventing colocation of data will not prevent worst case scenarios

Copyright © 2013 Cloud Security Alliance Causation versus correlation! Developers and managers without research experience may jump to conclusions

Copyright © 2013 Cloud Security Alliance Copyright © 2011 Cloud Security Alliance John Howie Big Data Research available at: Copyright © 2013 Cloud Security Alliance

Copyright © 2013 Cloud Security Alliance Copyright © 2013 Cloud Security Alliance