SlideShare a Scribd company logo
1 of 36
Download to read offline
June 30th , 2016
Big Data Security & Governance
Instilling Confidence and Trust
Nick Curcuru
©2016 MasterCard. Proprietary and Confidential
• Introduction to MasterCard
• Security Landscape
• Security Pillars
• Top 10 threats: Infrastructure and Data Architecture
• Hadoop Security Model
• Governance and Compliance
• Summary
2
Today’s Discussion
©2016 MasterCard. Proprietary and Confidential3
MasterCard – Technology & Services
Payment Processing
Payment Products
Sponsorships
Consulting Expertise
Information Services
Implementation Services
©2016 MasterCard. Proprietary and ConfidentialAugust 26, 20164
MasterCard helps our customers use Big Data
Increasing Revenue Generation
Increasing Analytic & IT Capabilities
Protecting Assets
Customer
Centricity
Monetization
of data
MasterCard Data Providing Hosting*
Capabilities
Real time interactions
Improve enterprise data
stewardship
Reduce risk of security
incident
Media
Measurements
Journey
Analytics
©2016 MasterCard. Proprietary and Confidential5
MasterCard Securing Big Data
2.2B+ GLOBAL
CARDS
160MM
TRANSACTIONS
PER HOUR
Advanced analytics
are applied in a
safe and secure
environment
finding trends and
insights
Card Swipes
Amount, spent, time, merchant & location.
Data Anonymized
Analysis | Risk Detection | Customer 360 | Location selection | Customer Engagement | Economic Indicators
©2016 MasterCard. Proprietary and Confidential6
Top 5 Industries for Cyber Attacks
Source: 2016 Cyber Security Intelligence Index
2015 1. Healthcare 2. Manufacturing 3. Financial Services 4. Government 5. Transportation
2014 1. Financial Services
2. Information &
Communication
3. Manufacturing
4. Retail and
wholesale
5. Energy and
Utilities
©2016 MasterCard. Proprietary and Confidential7
Per Record Cost of a Data Breach
Source : 2015 Cost of Data Breach Study:Global Analysis: Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC, May 2015
$363
$300
$220 $215
$179 $165 $155
$137 $136 $132 $129 $127 $126 $124 $121
$68
©2016 MasterCard. Proprietary and Confidential8
Your next attacker is likely to be someone you
thought you could trust
Source: 2016 Cyber Security Intelligence Index
©2016 MasterCard. Proprietary and Confidential9
Top 10 Infrastructure Vulnerabilities
Systems, Software, Storage
Perimeter Authentication
System Monitoring
Testing
User Authentication
Applications
Hardware
Encryption keys
Environments
Shared Responsibilities
Software Updates
1
2
3
4
5
6
7
8
9
10
©2016 MasterCard. Proprietary and Confidential10
Top 10 Data Architecture Vulnerabilities
Data - Architecture, Governance, Management
User Authentication
Applications
Hardware
Encryption keys
1
2
3
4
User Authentication
Applications
Hardware
Encryption keys
5
6
7
8
User Authentication
Applications
Hardware
9
10
11
User Authentication12
©2016 MasterCard. Proprietary and Confidential11
Nearly half of security incidents in 2015 were the result
of unauthorized access
Source: 2016 Cyber Security Intelligence Index
Unauthorized
access
Malicious
code
Sustained
probe/scan
Suspicious
activity
Access or
credentials
abuse
37%
20%
20%
11%
8%
45%
29%
16%
6%
3%
2014 2015
SECURITY PILLARS
©2016 MasterCard. Proprietary and Confidential13
Four Pillars of Security
PERIMETER
[Authenticating]
VISIBILITY
[Auditing]
ACCESS
[Authorizing]
DATA
[Architecting]
©2016 MasterCard. Proprietary and Confidential14
Perimeter Security – Authenticating
Guarding access to the environment (cluster)
Ensure your cluster:
• Preserves user choice of the right Hadoop service (e.g. Impala, Spark)
• Conforms to centrally managed authentication policies
• Implements with existing standard systems:
Active Directory and Kerberos -
1. User authenticates to Active Directory
2. Authenticated user gets Kerboros ticket
3. Ticket grants access to services
©2016 MasterCard. Proprietary and Confidential15
Access Security - Authorizing
Defining user roles and their data access
Outlining what data applications can use
Ensure your cluster:
• Defines and provides users access to data needed to do their job
• Centrally manages access policies – protect all paths with strong policies
moving security away from the applications
• Leverages a role-based access control model built on active directory
©2016 MasterCard. Proprietary and Confidential16
Visibility Security- Auditing
Reporting on where data came from and how it’s put together
Ensure your cluster:
• Can document where report data came from and how it was put together
• Complies with policies for audit, data classification, and lineage
• Centralizes the audit repository
©2016 MasterCard. Proprietary and Confidential17
Data Security – Architecting
Protecting data to internal and external standards
Ensure your cluster:
• Controls the data analysis is performed on
• Encrypts data protecting it from the root to its final destination
• Applies security at the meta data level
• Has well laid out encryption key management and token policies
• Integrates with existing hierarchical storage management as part of key
management infrastructure
©2016 MasterCard. Proprietary and Confidential18
Table stakes for big data security
• Native data encryption
• Security embedded in metadata
• Integrated key management
• Authorisation
• Authentication – Multi-Factor
• Strong role based access
• Monitoring in real time
• Audit and data lineage
• Hardware-enabled security
• Enterprise Identity management
integration
©2016 MasterCard. Proprietary and Confidential19
Best practices
People and Process
• Segregation of Duties
• Segregation of Data Access
• Continuous knowledge transfer, training and awareness
• Process documentation – controls, response and continuity planning
Technology
• Strong Authentication & Authorization
• Real Time Monitoring
• Regular Penetration Testing
©2016 MasterCard. Proprietary and Confidential20
Lessons learned
• Emphasize Hadoop isn’t one thing, but a “collection of things”
• Education & documentation is 60% of the effort
• Explain why Hadoop isn’t a database so don’t expect similar controls
• Security is neither quick nor easy
• Big Data technology is still maturing
• Close collaboration with your partners is critical
• Security is continuous not a check in the box
What to do
©2016 MasterCard. Proprietary and Confidential22
Where to Start
1. Assess security maturity over three dimension:
– People, Process and Technology
2. Classify data into categories
– Personally Identifiable, Health Data, Payment Related, Analysis
3. Start real time system and data monitoring
4. Take inventory of current Hadoop system security capabilities
– Refer to security table stakes and identify gaps
5. Identify training needs
– Business, Technology and Third Party Partners
©2016 MasterCard. Proprietary and Confidential23
Start with the Hadoop Security Maturity
Pilot: Data Free-for-All:
Available & Error-Prone
Basic Security Controls:
• Authorization
• Authentication
• Auditing
Data Security & Governance:
• Lineage Visibility
• Metadata Discovery
• Encryption & Key
Management
Regularoty Compliance
Audit-Ready & Protected
Security enforcement for all
data-at-rest and data-in-
motion
• Full encryption
• Encryption management
• Token system
management
• Transparency
• Real time monitoring
• Element level security
DataVolume&Sensitivity
Security Compliance & Risk Mitigation
Highly Vulnerable
Data at Risk
Reduced Risk
Exposure
Managed, Secure,
Protected
Enterprise Data Hub
Secure Data Vault
0 1 2 3
©2016 MasterCard. Proprietary and Confidential24
Transparent Encryption & Key Management
Protection for all data:
• Structured and unstructured
• Metadata, temp files and log files
Data-at-rest encryption options:
• HDFS Encryption for the data
• Encryption for: metadata – log files
Yarn – Resource
Manager
Data Management
Layer
Impala Hive
HDFS HBase
Apache Sentry
SSL Certificates and SSH Keys
Log/Config/Spill filesHSM
©2016 MasterCard. Proprietary and Confidential
Look at Apache Atlas
Source: Apache Software Foundation and Hortonworks
Features
• Data Classification
• Metadata
• Centralized Auditing
• Search & Lineage (Browse)
• Security & Policy Engine
©2016 MasterCard. Proprietary and Confidential
Compliance and Governance
Compliance
Evolution
Integrity
Stewardship
Ethics
Specific
• Taxonomy
• Transparency
• Auditability
• Consistency
• Accountability
• Checks-and-
Balances
• Standards
Governance
Controls
Guardian
©2016 MasterCard. Proprietary and Confidential27
Summary
• 60 % of threats are from inside the organization
• Security is applied end to end in the process
• Access: People, Process and Technology in your security strategy
• Hadoop is still maturing
• Governance includes data usage
• Don’t confuse compliance with security
QUESTIONS
©2016 MasterCard. Proprietary and Confidential
Contact Us
29
Nick Curcuru
+1 (914) 413 3822
Nick.Curcuru@mastercard.com
BONUS SLIDES
©2016 MasterCard. Proprietary and Confidential31
Top 10 Infrastructure Vulnerabilities
Perimeter Authentication
System Monitoring
Testing
User Authentication
Applications
Hardware
Encryption keys
Environments
Shared Responsibilities
Software Updates
1
2
3
4
5
6
7
8
9
10
©2016 MasterCard. Proprietary and Confidential32
Points of Attack- Infrastructure
Threat
Only password credentials for
authentication to environment
Applications controls data access
Database and application servers are the
same hardware
Users authenticate with generic/ shared/
application ID
Weakness Mitigation
Perimeter
Authentication
Access to data is at the system level and
at the data element (fine-grained)
User
authentication
Applications
Hardware
Encryption Keys Encryption keys are not rotated.
Use two-factor authentication: tokens, RSA
or Biometric technology
Credentials should never be shared: each user
and application should have unique/non-shared
credentials to host systems
Separate database and application
servers – isolates attack vectors
Set up periodic rotation of encryption
1
2
3
4
5
©2016 MasterCard. Proprietary and Confidential33
Points of Attack- Infrastructure
Threat
Insecure/uncertified environments have direct
access to secure/certified environments.
Patches or upgrades do not happen on a
regular release cycle to ensure the system is
protected from software vulnerabilities.
Platform not monitored on continual basis
setting up reactive posture: after the fact
Systems admin, DBA, application developer,
and web admin responsibilities are shared
Weakness Mitigation
Environments
Set up release schedule, hold software vendors to
security standards & verify standards are met
Shared
Responsibilities
Software Updates
System
Monitoring
Testing
Infrequent penetration tests and
application security scans
Segregate systems. Systems with access to each
other need the same levels of security and controls
Divide responsibilities implement role based
access and controls
Set up constant monitoring of
environment using data driven alert
Develop penetration testing schedule
and remediation review quarterly
6
7
8
9
10
©2016 MasterCard. Proprietary and Confidential34
Top 10 Data Architecture Vulnerabilities
User Authentication
Applications
Hardware
Encryption keys
1
2
3
4
User Authentication
Applications
Hardware
Encryption keys
5
6
7
8
User Authentication
Applications
Hardware
9
10
11
User Authentication12
©2016 MasterCard. Proprietary and Confidential35
Points of Attack-Enterprise Information Management
Threat
Sensitive data - encrypted /tokenized
/hashed is comingled with non- sensitive data
Users have access to data they should not, or
access to data that is unnecessary
Encryption Keys stored with the data they
encrypt.
Reliant on applications to control access to
data and enforce data security standards
Weakness Mitigation
Co-mingling of data
Use role based access control - Apply
fine-grained data access controls
Applications
Access Controls
Key Storage
Data Movement Sensitive data is not encrypted on
disk/at-rest or on the wire motion.
Use physical or logical separation between
data types.
Apply security at the table, field and element
level, as well as application level
Store encryption keys in a spate location
away from data and limit access through
control processes
Encrypt all sensitive data on disk/at-rest
or on the wire motion.
1
2
3
4
5
Access
©2016 MasterCard. Proprietary and Confidential36
Points of Attack-Enterprise Information Management
Threat
Security and operational configurations are
not documented or reviewed regularly
Little to no governance standards and rules
exist if they do they are focused on data quality
Information security response and business
continuity plan does not exist or is not
reviewed/exercised on a regular basis
Sensitive data is written to systems logs in an
unprotected form
Weakness Mitigation
Security & Operational
Configurations
Document standards, set up review cycle at
minimum yearly and include data usage as part of
the standards
Data Logs
Governance
standards
Response & Business
Continuity Plans
Data Usage Monitoring
Data usage either not monitored on
continual basis or is buried in logs with no
one looking at them
Document all configurations, develop audit trail
for changes, review configurations yearly
Metadata carries security throughout the data
trail and enables enforcement
Yearly review and revision of each plan using a
cross functional team: Infosec, IT, Operations, Legal
Set automated thresholds and
measurements using data to drive
exception alerts
6
7
8
9
10
Data - Architecture, Governance, Management

More Related Content

What's hot

Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big DataVipin Batra
 
Data Governance Initiative
Data Governance InitiativeData Governance Initiative
Data Governance InitiativeDataWorks Summit
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Making Data Timelier and More Reliable with Lakehouse Technology
Making Data Timelier and More Reliable with Lakehouse TechnologyMaking Data Timelier and More Reliable with Lakehouse Technology
Making Data Timelier and More Reliable with Lakehouse TechnologyMatei Zaharia
 
Data platform architecture
Data platform architectureData platform architecture
Data platform architectureSudheer Kondla
 
Data Governance
Data GovernanceData Governance
Data GovernanceRob Lux
 
Designing An Enterprise Data Fabric
Designing An Enterprise Data FabricDesigning An Enterprise Data Fabric
Designing An Enterprise Data FabricAlan McSweeney
 
Data Management Strategies
Data Management StrategiesData Management Strategies
Data Management StrategiesMicheal Axelsen
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceDATAVERSITY
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introductiondatatovalue
 
Idiro Analytics - Analytics & Big Data
Idiro Analytics - Analytics & Big DataIdiro Analytics - Analytics & Big Data
Idiro Analytics - Analytics & Big DataIdiro Analytics
 
Data Discovery at Databricks with Amundsen
Data Discovery at Databricks with AmundsenData Discovery at Databricks with Amundsen
Data Discovery at Databricks with AmundsenDatabricks
 
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationApache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationKai Wähner
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsCraig Mullins
 
DataEd Slides: Data Strategy Best Practices
DataEd Slides:  Data Strategy Best PracticesDataEd Slides:  Data Strategy Best Practices
DataEd Slides: Data Strategy Best PracticesDATAVERSITY
 
Inside open metadata—the deep dive
Inside open metadata—the deep diveInside open metadata—the deep dive
Inside open metadata—the deep diveDataWorks Summit
 
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Burak S. Arikan
 
What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?Hadi Fadlallah
 
Real-World Data Governance: What is a Data Steward and What Do They Do?
Real-World Data Governance: What is a Data Steward and What Do They Do?Real-World Data Governance: What is a Data Steward and What Do They Do?
Real-World Data Governance: What is a Data Steward and What Do They Do?DATAVERSITY
 

What's hot (20)

Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Data Governance Initiative
Data Governance InitiativeData Governance Initiative
Data Governance Initiative
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Making Data Timelier and More Reliable with Lakehouse Technology
Making Data Timelier and More Reliable with Lakehouse TechnologyMaking Data Timelier and More Reliable with Lakehouse Technology
Making Data Timelier and More Reliable with Lakehouse Technology
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Data platform architecture
Data platform architectureData platform architecture
Data platform architecture
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Designing An Enterprise Data Fabric
Designing An Enterprise Data FabricDesigning An Enterprise Data Fabric
Designing An Enterprise Data Fabric
 
Data Management Strategies
Data Management StrategiesData Management Strategies
Data Management Strategies
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data Governance
 
Data Quality Rules introduction
Data Quality Rules introductionData Quality Rules introduction
Data Quality Rules introduction
 
Idiro Analytics - Analytics & Big Data
Idiro Analytics - Analytics & Big DataIdiro Analytics - Analytics & Big Data
Idiro Analytics - Analytics & Big Data
 
Data Discovery at Databricks with Amundsen
Data Discovery at Databricks with AmundsenData Discovery at Databricks with Amundsen
Data Discovery at Databricks with Amundsen
 
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationApache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
 
DataEd Slides: Data Strategy Best Practices
DataEd Slides:  Data Strategy Best PracticesDataEd Slides:  Data Strategy Best Practices
DataEd Slides: Data Strategy Best Practices
 
Inside open metadata—the deep dive
Inside open metadata—the deep diveInside open metadata—the deep dive
Inside open metadata—the deep dive
 
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
 
What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?
 
Real-World Data Governance: What is a Data Steward and What Do They Do?
Real-World Data Governance: What is a Data Steward and What Do They Do?Real-World Data Governance: What is a Data Steward and What Do They Do?
Real-World Data Governance: What is a Data Steward and What Do They Do?
 

Viewers also liked

Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...CA API Management
 
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...APNIC
 
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th JuneOpen-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th JuneInnovative Management Services
 
BigDataEurope - Big Data & Energy
BigDataEurope - Big Data & EnergyBigDataEurope - Big Data & Energy
BigDataEurope - Big Data & EnergyBigData_Europe
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Enterprise Approach towards Cost Savings and Enterprise Agility
Enterprise Approach towards Cost Savings and Enterprise AgilityEnterprise Approach towards Cost Savings and Enterprise Agility
Enterprise Approach towards Cost Savings and Enterprise AgilityNUS-ISS
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
 
"Big Data" in the Energy Industry
"Big Data" in the Energy Industry"Big Data" in the Energy Industry
"Big Data" in the Energy IndustryPaige Bailey
 
Generating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentGenerating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentDavid Wallom
 
Building hadoop based big data environment
Building hadoop based big data environmentBuilding hadoop based big data environment
Building hadoop based big data environmentEvans Ye
 
Hdp security overview
Hdp security overview Hdp security overview
Hdp security overview Hortonworks
 
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATIONREAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATIONI3E Technologies
 
Smart Analytics For The Utility Sector
Smart Analytics For The Utility SectorSmart Analytics For The Utility Sector
Smart Analytics For The Utility SectorHerman Bosker
 
Building Hadoop Data Applications with Kite by Tom White
Building Hadoop Data Applications with Kite by Tom WhiteBuilding Hadoop Data Applications with Kite by Tom White
Building Hadoop Data Applications with Kite by Tom WhiteThe Hive
 
Demystify big data data science
Demystify big data  data scienceDemystify big data  data science
Demystify big data data scienceMahesh Kumar CV
 
Big Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyBig Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyHitachi Vantara
 
Mr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electricMr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electricRohan Pinto
 

Viewers also liked (20)

Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
 
Open-BDA Hadoop Summt 2014 - Post Summit Report
Open-BDA Hadoop Summt 2014 - Post Summit ReportOpen-BDA Hadoop Summt 2014 - Post Summit Report
Open-BDA Hadoop Summt 2014 - Post Summit Report
 
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
 
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th JuneOpen-BDA - Big Data Hadoop Developer Training 10th & 11th June
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
 
BigDataEurope - Big Data & Energy
BigDataEurope - Big Data & EnergyBigDataEurope - Big Data & Energy
BigDataEurope - Big Data & Energy
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Enterprise Approach towards Cost Savings and Enterprise Agility
Enterprise Approach towards Cost Savings and Enterprise AgilityEnterprise Approach towards Cost Savings and Enterprise Agility
Enterprise Approach towards Cost Savings and Enterprise Agility
 
Add
AddAdd
Add
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security
 
"Big Data" in the Energy Industry
"Big Data" in the Energy Industry"Big Data" in the Energy Industry
"Big Data" in the Energy Industry
 
Generating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentGenerating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the Environment
 
Building hadoop based big data environment
Building hadoop based big data environmentBuilding hadoop based big data environment
Building hadoop based big data environment
 
Hdp security overview
Hdp security overview Hdp security overview
Hdp security overview
 
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATIONREAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
 
Smart Analytics For The Utility Sector
Smart Analytics For The Utility SectorSmart Analytics For The Utility Sector
Smart Analytics For The Utility Sector
 
Building Hadoop Data Applications with Kite by Tom White
Building Hadoop Data Applications with Kite by Tom WhiteBuilding Hadoop Data Applications with Kite by Tom White
Building Hadoop Data Applications with Kite by Tom White
 
Demystify big data data science
Demystify big data  data scienceDemystify big data  data science
Demystify big data data science
 
Hadoop security
Hadoop securityHadoop security
Hadoop security
 
Big Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyBig Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage Strategy
 
Mr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electricMr. satish kumar, schnieder electric
Mr. satish kumar, schnieder electric
 

Similar to Big Data Security and Governance

How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...Ulf Mattsson
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
Time to re think our security process
Time to re think our security processTime to re think our security process
Time to re think our security processUlf Mattsson
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Cloudera, Inc.
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Cloudera, Inc.
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceDavid Walker
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...DataWorks Summit
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...DataStax
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Avi Networks
 
Best Practices for Protecting Sensitive Data Across the Big Data Platform
Best Practices for Protecting Sensitive Data Across the Big Data PlatformBest Practices for Protecting Sensitive Data Across the Big Data Platform
Best Practices for Protecting Sensitive Data Across the Big Data PlatformMapR Technologies
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!Emma Kelly
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 

Similar to Big Data Security and Governance (20)

How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Time to re think our security process
Time to re think our security processTime to re think our security process
Time to re think our security process
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI Compliance
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
Don’t Get Caught in a PCI Pickle: Meet Compliance and Protect Payment Card Da...
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
Best Practices for Protecting Sensitive Data Across the Big Data Platform
Best Practices for Protecting Sensitive Data Across the Big Data PlatformBest Practices for Protecting Sensitive Data Across the Big Data Platform
Best Practices for Protecting Sensitive Data Across the Big Data Platform
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 

More from DataWorks Summit/Hadoop Summit

Unleashing the Power of Apache Atlas with Apache Ranger
Unleashing the Power of Apache Atlas with Apache RangerUnleashing the Power of Apache Atlas with Apache Ranger
Unleashing the Power of Apache Atlas with Apache RangerDataWorks Summit/Hadoop Summit
 
Enabling Digital Diagnostics with a Data Science Platform
Enabling Digital Diagnostics with a Data Science PlatformEnabling Digital Diagnostics with a Data Science Platform
Enabling Digital Diagnostics with a Data Science PlatformDataWorks Summit/Hadoop Summit
 
Double Your Hadoop Performance with Hortonworks SmartSense
Double Your Hadoop Performance with Hortonworks SmartSenseDouble Your Hadoop Performance with Hortonworks SmartSense
Double Your Hadoop Performance with Hortonworks SmartSenseDataWorks Summit/Hadoop Summit
 
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...DataWorks Summit/Hadoop Summit
 
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...DataWorks Summit/Hadoop Summit
 
Mool - Automated Log Analysis using Data Science and ML
Mool - Automated Log Analysis using Data Science and MLMool - Automated Log Analysis using Data Science and ML
Mool - Automated Log Analysis using Data Science and MLDataWorks Summit/Hadoop Summit
 
The Challenge of Driving Business Value from the Analytics of Things (AOT)
The Challenge of Driving Business Value from the Analytics of Things (AOT)The Challenge of Driving Business Value from the Analytics of Things (AOT)
The Challenge of Driving Business Value from the Analytics of Things (AOT)DataWorks Summit/Hadoop Summit
 
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...DataWorks Summit/Hadoop Summit
 

More from DataWorks Summit/Hadoop Summit (20)

Running Apache Spark & Apache Zeppelin in Production
Running Apache Spark & Apache Zeppelin in ProductionRunning Apache Spark & Apache Zeppelin in Production
Running Apache Spark & Apache Zeppelin in Production
 
State of Security: Apache Spark & Apache Zeppelin
State of Security: Apache Spark & Apache ZeppelinState of Security: Apache Spark & Apache Zeppelin
State of Security: Apache Spark & Apache Zeppelin
 
Unleashing the Power of Apache Atlas with Apache Ranger
Unleashing the Power of Apache Atlas with Apache RangerUnleashing the Power of Apache Atlas with Apache Ranger
Unleashing the Power of Apache Atlas with Apache Ranger
 
Enabling Digital Diagnostics with a Data Science Platform
Enabling Digital Diagnostics with a Data Science PlatformEnabling Digital Diagnostics with a Data Science Platform
Enabling Digital Diagnostics with a Data Science Platform
 
Revolutionize Text Mining with Spark and Zeppelin
Revolutionize Text Mining with Spark and ZeppelinRevolutionize Text Mining with Spark and Zeppelin
Revolutionize Text Mining with Spark and Zeppelin
 
Double Your Hadoop Performance with Hortonworks SmartSense
Double Your Hadoop Performance with Hortonworks SmartSenseDouble Your Hadoop Performance with Hortonworks SmartSense
Double Your Hadoop Performance with Hortonworks SmartSense
 
Hadoop Crash Course
Hadoop Crash CourseHadoop Crash Course
Hadoop Crash Course
 
Data Science Crash Course
Data Science Crash CourseData Science Crash Course
Data Science Crash Course
 
Apache Spark Crash Course
Apache Spark Crash CourseApache Spark Crash Course
Apache Spark Crash Course
 
Dataflow with Apache NiFi
Dataflow with Apache NiFiDataflow with Apache NiFi
Dataflow with Apache NiFi
 
Schema Registry - Set you Data Free
Schema Registry - Set you Data FreeSchema Registry - Set you Data Free
Schema Registry - Set you Data Free
 
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
 
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
 
Mool - Automated Log Analysis using Data Science and ML
Mool - Automated Log Analysis using Data Science and MLMool - Automated Log Analysis using Data Science and ML
Mool - Automated Log Analysis using Data Science and ML
 
How Hadoop Makes the Natixis Pack More Efficient
How Hadoop Makes the Natixis Pack More Efficient How Hadoop Makes the Natixis Pack More Efficient
How Hadoop Makes the Natixis Pack More Efficient
 
HBase in Practice
HBase in Practice HBase in Practice
HBase in Practice
 
The Challenge of Driving Business Value from the Analytics of Things (AOT)
The Challenge of Driving Business Value from the Analytics of Things (AOT)The Challenge of Driving Business Value from the Analytics of Things (AOT)
The Challenge of Driving Business Value from the Analytics of Things (AOT)
 
Breaking the 1 Million OPS/SEC Barrier in HOPS Hadoop
Breaking the 1 Million OPS/SEC Barrier in HOPS HadoopBreaking the 1 Million OPS/SEC Barrier in HOPS Hadoop
Breaking the 1 Million OPS/SEC Barrier in HOPS Hadoop
 
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
 
Backup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in Hadoop Backup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in Hadoop
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Big Data Security and Governance

  • 1. June 30th , 2016 Big Data Security & Governance Instilling Confidence and Trust Nick Curcuru
  • 2. ©2016 MasterCard. Proprietary and Confidential • Introduction to MasterCard • Security Landscape • Security Pillars • Top 10 threats: Infrastructure and Data Architecture • Hadoop Security Model • Governance and Compliance • Summary 2 Today’s Discussion
  • 3. ©2016 MasterCard. Proprietary and Confidential3 MasterCard – Technology & Services Payment Processing Payment Products Sponsorships Consulting Expertise Information Services Implementation Services
  • 4. ©2016 MasterCard. Proprietary and ConfidentialAugust 26, 20164 MasterCard helps our customers use Big Data Increasing Revenue Generation Increasing Analytic & IT Capabilities Protecting Assets Customer Centricity Monetization of data MasterCard Data Providing Hosting* Capabilities Real time interactions Improve enterprise data stewardship Reduce risk of security incident Media Measurements Journey Analytics
  • 5. ©2016 MasterCard. Proprietary and Confidential5 MasterCard Securing Big Data 2.2B+ GLOBAL CARDS 160MM TRANSACTIONS PER HOUR Advanced analytics are applied in a safe and secure environment finding trends and insights Card Swipes Amount, spent, time, merchant & location. Data Anonymized Analysis | Risk Detection | Customer 360 | Location selection | Customer Engagement | Economic Indicators
  • 6. ©2016 MasterCard. Proprietary and Confidential6 Top 5 Industries for Cyber Attacks Source: 2016 Cyber Security Intelligence Index 2015 1. Healthcare 2. Manufacturing 3. Financial Services 4. Government 5. Transportation 2014 1. Financial Services 2. Information & Communication 3. Manufacturing 4. Retail and wholesale 5. Energy and Utilities
  • 7. ©2016 MasterCard. Proprietary and Confidential7 Per Record Cost of a Data Breach Source : 2015 Cost of Data Breach Study:Global Analysis: Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC, May 2015 $363 $300 $220 $215 $179 $165 $155 $137 $136 $132 $129 $127 $126 $124 $121 $68
  • 8. ©2016 MasterCard. Proprietary and Confidential8 Your next attacker is likely to be someone you thought you could trust Source: 2016 Cyber Security Intelligence Index
  • 9. ©2016 MasterCard. Proprietary and Confidential9 Top 10 Infrastructure Vulnerabilities Systems, Software, Storage Perimeter Authentication System Monitoring Testing User Authentication Applications Hardware Encryption keys Environments Shared Responsibilities Software Updates 1 2 3 4 5 6 7 8 9 10
  • 10. ©2016 MasterCard. Proprietary and Confidential10 Top 10 Data Architecture Vulnerabilities Data - Architecture, Governance, Management User Authentication Applications Hardware Encryption keys 1 2 3 4 User Authentication Applications Hardware Encryption keys 5 6 7 8 User Authentication Applications Hardware 9 10 11 User Authentication12
  • 11. ©2016 MasterCard. Proprietary and Confidential11 Nearly half of security incidents in 2015 were the result of unauthorized access Source: 2016 Cyber Security Intelligence Index Unauthorized access Malicious code Sustained probe/scan Suspicious activity Access or credentials abuse 37% 20% 20% 11% 8% 45% 29% 16% 6% 3% 2014 2015
  • 13. ©2016 MasterCard. Proprietary and Confidential13 Four Pillars of Security PERIMETER [Authenticating] VISIBILITY [Auditing] ACCESS [Authorizing] DATA [Architecting]
  • 14. ©2016 MasterCard. Proprietary and Confidential14 Perimeter Security – Authenticating Guarding access to the environment (cluster) Ensure your cluster: • Preserves user choice of the right Hadoop service (e.g. Impala, Spark) • Conforms to centrally managed authentication policies • Implements with existing standard systems: Active Directory and Kerberos - 1. User authenticates to Active Directory 2. Authenticated user gets Kerboros ticket 3. Ticket grants access to services
  • 15. ©2016 MasterCard. Proprietary and Confidential15 Access Security - Authorizing Defining user roles and their data access Outlining what data applications can use Ensure your cluster: • Defines and provides users access to data needed to do their job • Centrally manages access policies – protect all paths with strong policies moving security away from the applications • Leverages a role-based access control model built on active directory
  • 16. ©2016 MasterCard. Proprietary and Confidential16 Visibility Security- Auditing Reporting on where data came from and how it’s put together Ensure your cluster: • Can document where report data came from and how it was put together • Complies with policies for audit, data classification, and lineage • Centralizes the audit repository
  • 17. ©2016 MasterCard. Proprietary and Confidential17 Data Security – Architecting Protecting data to internal and external standards Ensure your cluster: • Controls the data analysis is performed on • Encrypts data protecting it from the root to its final destination • Applies security at the meta data level • Has well laid out encryption key management and token policies • Integrates with existing hierarchical storage management as part of key management infrastructure
  • 18. ©2016 MasterCard. Proprietary and Confidential18 Table stakes for big data security • Native data encryption • Security embedded in metadata • Integrated key management • Authorisation • Authentication – Multi-Factor • Strong role based access • Monitoring in real time • Audit and data lineage • Hardware-enabled security • Enterprise Identity management integration
  • 19. ©2016 MasterCard. Proprietary and Confidential19 Best practices People and Process • Segregation of Duties • Segregation of Data Access • Continuous knowledge transfer, training and awareness • Process documentation – controls, response and continuity planning Technology • Strong Authentication & Authorization • Real Time Monitoring • Regular Penetration Testing
  • 20. ©2016 MasterCard. Proprietary and Confidential20 Lessons learned • Emphasize Hadoop isn’t one thing, but a “collection of things” • Education & documentation is 60% of the effort • Explain why Hadoop isn’t a database so don’t expect similar controls • Security is neither quick nor easy • Big Data technology is still maturing • Close collaboration with your partners is critical • Security is continuous not a check in the box
  • 22. ©2016 MasterCard. Proprietary and Confidential22 Where to Start 1. Assess security maturity over three dimension: – People, Process and Technology 2. Classify data into categories – Personally Identifiable, Health Data, Payment Related, Analysis 3. Start real time system and data monitoring 4. Take inventory of current Hadoop system security capabilities – Refer to security table stakes and identify gaps 5. Identify training needs – Business, Technology and Third Party Partners
  • 23. ©2016 MasterCard. Proprietary and Confidential23 Start with the Hadoop Security Maturity Pilot: Data Free-for-All: Available & Error-Prone Basic Security Controls: • Authorization • Authentication • Auditing Data Security & Governance: • Lineage Visibility • Metadata Discovery • Encryption & Key Management Regularoty Compliance Audit-Ready & Protected Security enforcement for all data-at-rest and data-in- motion • Full encryption • Encryption management • Token system management • Transparency • Real time monitoring • Element level security DataVolume&Sensitivity Security Compliance & Risk Mitigation Highly Vulnerable Data at Risk Reduced Risk Exposure Managed, Secure, Protected Enterprise Data Hub Secure Data Vault 0 1 2 3
  • 24. ©2016 MasterCard. Proprietary and Confidential24 Transparent Encryption & Key Management Protection for all data: • Structured and unstructured • Metadata, temp files and log files Data-at-rest encryption options: • HDFS Encryption for the data • Encryption for: metadata – log files Yarn – Resource Manager Data Management Layer Impala Hive HDFS HBase Apache Sentry SSL Certificates and SSH Keys Log/Config/Spill filesHSM
  • 25. ©2016 MasterCard. Proprietary and Confidential Look at Apache Atlas Source: Apache Software Foundation and Hortonworks Features • Data Classification • Metadata • Centralized Auditing • Search & Lineage (Browse) • Security & Policy Engine
  • 26. ©2016 MasterCard. Proprietary and Confidential Compliance and Governance Compliance Evolution Integrity Stewardship Ethics Specific • Taxonomy • Transparency • Auditability • Consistency • Accountability • Checks-and- Balances • Standards Governance Controls Guardian
  • 27. ©2016 MasterCard. Proprietary and Confidential27 Summary • 60 % of threats are from inside the organization • Security is applied end to end in the process • Access: People, Process and Technology in your security strategy • Hadoop is still maturing • Governance includes data usage • Don’t confuse compliance with security
  • 29. ©2016 MasterCard. Proprietary and Confidential Contact Us 29 Nick Curcuru +1 (914) 413 3822 Nick.Curcuru@mastercard.com
  • 31. ©2016 MasterCard. Proprietary and Confidential31 Top 10 Infrastructure Vulnerabilities Perimeter Authentication System Monitoring Testing User Authentication Applications Hardware Encryption keys Environments Shared Responsibilities Software Updates 1 2 3 4 5 6 7 8 9 10
  • 32. ©2016 MasterCard. Proprietary and Confidential32 Points of Attack- Infrastructure Threat Only password credentials for authentication to environment Applications controls data access Database and application servers are the same hardware Users authenticate with generic/ shared/ application ID Weakness Mitigation Perimeter Authentication Access to data is at the system level and at the data element (fine-grained) User authentication Applications Hardware Encryption Keys Encryption keys are not rotated. Use two-factor authentication: tokens, RSA or Biometric technology Credentials should never be shared: each user and application should have unique/non-shared credentials to host systems Separate database and application servers – isolates attack vectors Set up periodic rotation of encryption 1 2 3 4 5
  • 33. ©2016 MasterCard. Proprietary and Confidential33 Points of Attack- Infrastructure Threat Insecure/uncertified environments have direct access to secure/certified environments. Patches or upgrades do not happen on a regular release cycle to ensure the system is protected from software vulnerabilities. Platform not monitored on continual basis setting up reactive posture: after the fact Systems admin, DBA, application developer, and web admin responsibilities are shared Weakness Mitigation Environments Set up release schedule, hold software vendors to security standards & verify standards are met Shared Responsibilities Software Updates System Monitoring Testing Infrequent penetration tests and application security scans Segregate systems. Systems with access to each other need the same levels of security and controls Divide responsibilities implement role based access and controls Set up constant monitoring of environment using data driven alert Develop penetration testing schedule and remediation review quarterly 6 7 8 9 10
  • 34. ©2016 MasterCard. Proprietary and Confidential34 Top 10 Data Architecture Vulnerabilities User Authentication Applications Hardware Encryption keys 1 2 3 4 User Authentication Applications Hardware Encryption keys 5 6 7 8 User Authentication Applications Hardware 9 10 11 User Authentication12
  • 35. ©2016 MasterCard. Proprietary and Confidential35 Points of Attack-Enterprise Information Management Threat Sensitive data - encrypted /tokenized /hashed is comingled with non- sensitive data Users have access to data they should not, or access to data that is unnecessary Encryption Keys stored with the data they encrypt. Reliant on applications to control access to data and enforce data security standards Weakness Mitigation Co-mingling of data Use role based access control - Apply fine-grained data access controls Applications Access Controls Key Storage Data Movement Sensitive data is not encrypted on disk/at-rest or on the wire motion. Use physical or logical separation between data types. Apply security at the table, field and element level, as well as application level Store encryption keys in a spate location away from data and limit access through control processes Encrypt all sensitive data on disk/at-rest or on the wire motion. 1 2 3 4 5 Access
  • 36. ©2016 MasterCard. Proprietary and Confidential36 Points of Attack-Enterprise Information Management Threat Security and operational configurations are not documented or reviewed regularly Little to no governance standards and rules exist if they do they are focused on data quality Information security response and business continuity plan does not exist or is not reviewed/exercised on a regular basis Sensitive data is written to systems logs in an unprotected form Weakness Mitigation Security & Operational Configurations Document standards, set up review cycle at minimum yearly and include data usage as part of the standards Data Logs Governance standards Response & Business Continuity Plans Data Usage Monitoring Data usage either not monitored on continual basis or is buried in logs with no one looking at them Document all configurations, develop audit trail for changes, review configurations yearly Metadata carries security throughout the data trail and enables enforcement Yearly review and revision of each plan using a cross functional team: Infosec, IT, Operations, Legal Set automated thresholds and measurements using data to drive exception alerts 6 7 8 9 10 Data - Architecture, Governance, Management