The big Data security Analytics Era Is Here Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU

Slides:



Advertisements
Similar presentations
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Big Data Privacy Issues in Public Social Media Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Digital Content Solutions Digital content management technology has transformed the way to manage content and knowledge, in this knowledge era. Research.
Big Data, Big Commerce, Big Challenge Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Database – Part 3 Dr. V.T. Raja Oregon State University External References/Sources: Data Warehousing – Mr. Sakthi Angappamudali.
The State of Security Management By Jim Reavis January 2003.
Unified Logs and Reporting for Hybrid Centralized Management
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Database – Part 2b Dr. V.T. Raja Oregon State University External References/Sources: Data Warehousing – Sakthi Angappamudali at Standard Insurance; BI.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
McGraw-Hill/Irwin © 2005 The McGraw-Hill Companies, Inc. All rights reserved Chapter The Future of Training and Development.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Amadeus Travel Intelligence ‘Monetising’ big data sets
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Joel Maloff Phone.com February, 2012.
E-Learning, Human Capital Management and the Banking Sector Dimitris Baltas, ATC ROM.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco CloudVerse for Government: Helping Agencies Reduce Costs and Respond.
How Will Continuous Auditing and XBRL-GL Work Together to Provide Improved Business Value? Nigel J. R. Matthews, BASc, CA ACL Services Ltd.
By N.Gopinath AP/CSE. Why a Data Warehouse Application – Business Perspectives  There are several reasons why organizations consider Data Warehousing.
What is Business Intelligence? Business intelligence (BI) –Range of applications, practices, and technologies for the extraction, translation, integration,
What is Enterprise Architecture?
Opening Keynote Presentation An Architecture for Intelligent Trading  Alessandro Petroni – Senior Principal Architect, Financial Services, TIBCO Software.
Dell Connected Security Solutions Simplify & unify.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
Information Management LIS /1/99 Martha Richardson.
Corporate Information Reconnaissance Cell (CIRC).
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Agenda Motion Imagery Challenges Overview of our Cloud Activities -Big Data -Large Data Implementation Lessons Learned Summary.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Network security Product Group 2 McAfee Network Security Platform.
Intelligent Performance Management Empowering Your Enterprise Duane E. Presti, CEO PARIS Technologies, Inc.
© 2010 IBM Corporation Business Analytics software Business Analytics Editable Text Editable Text Editable Text.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Kathy Corbiere Service Delivery and Performance Commission
SAM for SQL Workloads Presenter Name.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware iCARE : A Framework for Big Data Based.
+ Logentries Is a Real-Time Log Analytics Service for Aggregating, Analyzing, and Alerting on Log Data from Microsoft Azure Apps and Systems MICROSOFT.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Cloud Computing Security With More Than 50 Years Of Security And Enterprise Experience Cloud Raxak Automating Cloud Security. Cloud Raxak automates and.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
What is the Big Data Challenge? Organizations are seeking solutions that combine the real-time analytics capabilities of SAP HANA and accessibility to.
Enterprise Network Security Threats that are Overlooked.
Designing Cisco Data Center Unified Fabric
Leverage Big Data With Hadoop Analytics Presentation by Ravi Namboori Visit
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
SAM Baseline Review Engagement
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Organizations Are Embracing New Opportunities
Data Platform and Analytics Foundational Training
WEBINAR The Rise Of Insights Services
Trends in my profession, Information Technology
Speaker’s Name, SAP Month 00, 2017
CIO Roadmaps: Integrated Components
Security Essentials for Small Businesses
ITP Maturity Model Survey 2018
Big Data Young Lee BUS 550.
Dark Data Are we at risk?.
KEY INITIATIVE Internal Control and Technical Accounting
The Intelligent Enterprise and SAP Business One
Presentation transcript:

The big Data security Analytics Era Is Here Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU

Liu Ximeng Main Source: white paper: The big data security analytics era is here. Source: ESG Research Report, U.S Advanced Persistent Threat Analysis, 2011 Source ; ESG Research Report, Security Management an Operations: Changes on the Horizon, References

Liu Ximeng Obstacle faced NOW. Enter the big data security analytics Era  What is the challenge the big data bring to us? Outline

Liu Ximeng The obstacles to improving organizational security Maturity

Liu Ximeng The model was first published by ESG in The ESG assumed that the risk-based security would be established by most organizations by early Many non-security executives  information security oversight and increasing information security budgets. BUT, still failed transition from phase 2 to 3. WHY? The obstacles to improving organizational security maturity

Liu Ximeng 1. The volume and sophistication of new threat : The threat increase at exponential rate. According to ESG , 59% company certain or fairly certain they have been the target of an APT(Advanced Persistent Threats , example “ Stuxnet computer worm”). Detecting, analyzing and remediating add additional requirements to risk-based phase.Stuxnetcomputer worm The obstacles difficult transition from phase 2 to 3

Liu Ximeng 2. Rapid IT changes : New immature technology: virtualization, cloud computing, mobile device support.  immature, prone to security vulnerability. The obstacles difficult transition from phase 2 to 3

Liu Ximeng Mobile device present a number of security challenges

Liu Ximeng 3. A growing security skill shortage: Over 50% organization add number of information security group, 23%  shortage of security skill. But 83% of enterprise organization find it is difficult to hire security professionals. The obstacles difficult transition from phase 2 to 3

Liu Ximeng The challenges the organization faces

Liu Ximeng 1. Security analytics tool cannot keep up with today’s data collection and processing needs.  more online security data are analysis, investigation, and modeling  Proprietary data stores that cannot scale for such type of data volume.  slow down the detection/response  increase the IT risk. Challenges of the analytic tool

Liu Ximeng How has the amount of data you organization collects

Liu Ximeng 2. Organization need an enterprise-wide security purview  against explicit types of threats  aggregated tool: labor-intensive. 3. Existing security analysis tool depend excessively on customization and human intelligence  Enterprise security analysis need strong experience.  need a tool to reduce their work. Challenges of the analytic tool

Liu Ximeng Big Data

Liu Ximeng Tools different, tactics is different. Big data  volume of data collection, processing, storage and analysis. security analytics rapidly. Enter the Big data security analytics Era

Liu Ximeng The organization is now considering the big data

Liu Ximeng To ESG, big data security is really about collecting and processing numerous internal and external security data sources, and analyzing this data immediately to gain real-time situational awareness across the enterprise. Once the security data is analyzed, new intelligence as a baseline for adjusting security strategies, much faster than ever before. The Challenges big data bring to us

Liu Ximeng Massive scale: Efficiently collect, process, query and analytics rules to TB or PB (Hadoop, distributed processing of extremely large data across servers is fit for security analytics requirements). Also, big data security analytics deployed in a distributed architecture. Centralize analysis of massive volumes of distributed data while maintaining data integrity and providing for high-performance needs. A new security system providing

Liu Ximeng Enhanced intelligence: big data security analytics offer combination of templates, heuristics, statistical and behavior models… Tight integration. Big data security analytics should be integrated with security policy control for tactical adjustments and automation.  minimize risk. (Unusual traffic flow, Change the instructions ) A new security system providing

Liu Ximeng Address limitation with existing security infrastructure : Compare security analytics output with existing capabilities, processes, and requirement. Shift investment from prevention to detection/remediation. Identify staffing deficiencies and knowledge gaps : Hire and train. ESG recommends that CISOs clearly identify areas of weakness at the genesis of their big data security analytics planning process. ESG suggest CISOs

Liu Ximeng Security challenge of Big data: collecting and processing in real-time. Varity  All types of formats. Volume is huge. Difficult to processing real-time. In a distributed architecture. Centralize analysis of massive volumes of distributed data while maintaining data integrity and providing for high- performance needs. Discussion

Liu Ximeng Thank you Rongxing’s Homepage: PPT Ximeng’s Homepage: