SlideShare uma empresa Scribd logo
1 de 20
@NTXISSA
Information Security Opportunity:
Embracing Big Data with People,
Process & Technology
Robert L. Pace
Senior Consultant
Dell
April 25, 2015
@NTXISSA
3Ps
• Purpose
• Discussion – “Security Opportunity – Embracing Big Data with
People, Process & Technology
• Process
• Review of slide presentation & collaborative discussion
• Product
• Increased awareness for participants to begin and/or expand upon
channels for utilizing Big Data to enhance their respective security
programs via People, Process & Technology
@NTXISSA
Robert L. Pace
• Over 15 years in Information Security, working with various companies
in different market verticals, both public and privately held.
• Career at Dell began in 2012. I am responsible for delivering and
managing a comprehensive Information Security Program for a major IT
Outsourcing engagement for Dell. Work activity requires leadership of
key IT Security governance processes, designing of security processes,
enhancement of IT Security policies and analysis of escalated security
threats for strategic countermeasures.
• Certifications – CISSP; CISM; C|CISO; ITILv3; Six Sigma Green Belt
• Education – Michigan State University – Bachelor of Science; Walsh
College of Accountancy & Business Administration – Master of Science;
Thunderbird Gavin International Institute – Executive Leadership
Program
• Contact – robert_pace@dell.com; (972) 577-5842
@NTXISSA
Industry Data Cyber
Attacks Continues
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 5
Data extracted from 2014 Global Report on the Cost of Cyber Crime, published by the Ponemon Institute
No Decrease in Cyber Attacks
“…..In our studies we look at 9 different attack vectors as the source of
the cyber crime. This year, the benchmark sample of 257 organizations
experienced 429 discernible cyber attacks or 1.6 attacks per company
each week. The list below shows the number of successful attacks for
the past three years, which has steadily increased.”
• FY 2014, 429 attacks in 257 organizations or 1.7 successful attacks per
company each week
• FY 2013, 343 attacks in 234 organizations or 1.4 successful attacks per
company each week
• FY 2012, 262 attacks in 199 organizations or 1.3 successful attacks per
company each week
Types of Attacks
Cost of Cyber Crime
IT Security Spend
Embracing Big Data – People, Process & Technology
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 6
Embracing Big Data – People, Process & Technology
Available Data - Corp & Business Centric
HR – Human Capital; Job Roles
Supply Chain; Vendor Mgmt; Contracts;PMO
Info Security Policies/Stds
AV; Encryption; IDS/IPS;
DB; Mainframe; MDM
File Integrity; HIDS; NIDS; Content
Filtering; FW; NAC;
Scanning Actions; DLP;
Identity Mgmt;
Industry Trends
Big Data View
Collection of data from multiple sources in an effort to gain better intelligence
Deliverable - IT Security Team Analyzes; Directs Remediation
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 7
Embracing Big Data – People, Process & Technology
Source: Dell SecureWorks Threat Analysis
Increasing Amount of Questions –
Primary Driver for Embracing “BIG DATA”
@NTXISSA
Sample Definitions of Big
Data and Information
Security
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 9
Embracing Big Data – People, Process & Technology
•A new attitude by businesses, non-profits, government
agencies, and individuals that combining data from multiple
sources could lead to better decisions.
•An all-encompassing term for any collection of data sets so
large and complex that it becomes difficult to process them
using traditional data processing applications.
•Volume; Variety; Velocity; Variability; Veracity; Value
Big Data
•The practice of defending information from unauthorized
access, use, disclosure, disruption, modification, perusal,
inspection, recording or destruction. It is a general term that
can be used regardless of the form the data
•Cornerstone concepts in the variety of definitions –
Confidentiality, Integrity & Availability
Information
Security
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 10
Embracing Big Data – People, Process & Technology
@NTXISSA
Big
Data
NTX ISSA Cyber Security Conference – April 24-25, 2015 11
Embracing Big Data – People, Process & Technology
Big Data
• SIEM Data
• Vulnerability Scanning
• Application Scanning
• Network Access Control
• MDM/MAM
Big Data
• GRC Application
• Asset Management (HW/SW)
• Incident Management
• Patch Management
• Identity & Access Management
Security Program Requires “Big Data” Coordination with
Organizational Maturity & Data Governance
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 12
Embracing Big Data – People, Process & Technology
People; PROCESS & Technology
Leveraging the V’s of “Big Data” to Enhance Context of Risk Definition
“IMPACT” X “PROBABILITY” = RISK
Actionable
Information
“VALUE”
Monitoring &
Logging
Incident
Management
Asset
Mgmt
Organizational
Infusion
Threat
Intelligence
Dynamic
Reporting
Emergence of Security
Business Intelligence - SBI
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 13
Embracing Big Data – People, Process & Technology
People; Process & TECHNOLOGY
Technology
• Leveraging technologies used by Marketing &
Advertisers
• NoSQL, Hadoop, MapReduce, etc.
• Accustomed to working with Petabytes,
Adaptable Structure & Automation Yielding Increased Security Posture
Big Data
• GRC Application
• Asset Management (HW/SW)
• Incident Management
• Patch Management
• SIEM Data
• Identity & Access
Management
• Vulnerability Scanning
• Application Scanning
• Wireless Detection Scanning
• Security Awareness Training
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 14
Embracing Big Data – People, Process & Technology
http://www.dataversity.net/big-data-demystified-market-analysis-and-business-potential/
Internet of Things
• All Market Segments Contributing
Marketing & Advertising
• Deeper Understanding of “Big Data”
• Centered on Yielding Business
Objectives
Diverseness of Landscape & Expected Volumes To Increase Exponentially
@NTXISSA
Industry Views
ofBig Data and
Information Security
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 16
Embracing Big Data – People, Process & Technology
• Presentation at RSA Conference 2014 on Big Data
• Term Security Business Intelligence floated as new type of analysis needed
• Structure of heavy duty processor to effectively process the data in a timely manner
View of what Intel is considering ~ SBI centered on protection of their “ Intellectual Property”
@NTXISSA
Challenges, Risks &
Transformation
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 18
Embracing Big Data – People, Process & Technology
Advertising &
Marketing Techniques
• Understand data mining
• Enormous capacities
Creative Thinking
• There is “no-box”
• Agile and Adaptable to the
situation….
• More self-healing controls
Data Structures
• Large collection, unbounded
• Schema on “Write” vs on
the “Read”
New Talent Level
• Heavy analytic skills
• Data Miners with Big Data
Certifications
• Will learn Information
Security….not core skill
Information Security Transformation... “Radical Thinking”
Potential Challenges & Risks for SBI and Big Data
PEOPLE; Process & Technology
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 19
Embracing Big Data – People, Process & Technology
Questions
@NTXISSA@NTXISSA
The Collin College Engineering Department
Collin College Student Chapter of the North Texas ISSA
North Texas ISSA (Information Systems Security Association)
NTX ISSA Cyber Security Conference – April 24-25, 2015 20
Thank you

Mais conteúdo relacionado

Mais procurados

Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
Alert Logic
 

Mais procurados (20)

NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
 
NTXISSACSC1 Conference - Security is Doomed by Jesse Lee
NTXISSACSC1 Conference - Security is Doomed by Jesse LeeNTXISSACSC1 Conference - Security is Doomed by Jesse Lee
NTXISSACSC1 Conference - Security is Doomed by Jesse Lee
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Emerging Threats and Strategies of Defense
Emerging Threats and Strategies of Defense Emerging Threats and Strategies of Defense
Emerging Threats and Strategies of Defense
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Ransomware: The Impact is Real
Ransomware: The Impact is RealRansomware: The Impact is Real
Ransomware: The Impact is Real
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
 
Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesDemystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use Cases
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Managed Cyber Security Services
Managed Cyber Security ServicesManaged Cyber Security Services
Managed Cyber Security Services
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan HorseNTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan Horse
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 

Semelhante a NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with People, Process & Technology by Robert L. Pace

The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
Trillium Software
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Generating actionable consumer insights from analytics - Telekom R&D
Generating actionable consumer insights from analytics - Telekom R&DGenerating actionable consumer insights from analytics - Telekom R&D
Generating actionable consumer insights from analytics - Telekom R&D
Merlien Institute
 

Semelhante a NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with People, Process & Technology by Robert L. Pace (20)

Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data Governance
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
Microservices Approaches for Continuous Data Integration
Microservices Approaches for Continuous Data IntegrationMicroservices Approaches for Continuous Data Integration
Microservices Approaches for Continuous Data Integration
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
 
Generating actionable consumer insights from analytics - Telekom R&D
Generating actionable consumer insights from analytics - Telekom R&DGenerating actionable consumer insights from analytics - Telekom R&D
Generating actionable consumer insights from analytics - Telekom R&D
 
BDA 2012 Big data why the big fuss?
BDA 2012 Big data why the big fuss?BDA 2012 Big data why the big fuss?
BDA 2012 Big data why the big fuss?
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
DoD Data Quality Challenges
DoD Data Quality ChallengesDoD Data Quality Challenges
DoD Data Quality Challenges
 

Mais de North Texas Chapter of the ISSA

Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
North Texas Chapter of the ISSA
 

Mais de North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

Último

➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 

NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with People, Process & Technology by Robert L. Pace

  • 1. @NTXISSA Information Security Opportunity: Embracing Big Data with People, Process & Technology Robert L. Pace Senior Consultant Dell April 25, 2015
  • 2. @NTXISSA 3Ps • Purpose • Discussion – “Security Opportunity – Embracing Big Data with People, Process & Technology • Process • Review of slide presentation & collaborative discussion • Product • Increased awareness for participants to begin and/or expand upon channels for utilizing Big Data to enhance their respective security programs via People, Process & Technology
  • 3. @NTXISSA Robert L. Pace • Over 15 years in Information Security, working with various companies in different market verticals, both public and privately held. • Career at Dell began in 2012. I am responsible for delivering and managing a comprehensive Information Security Program for a major IT Outsourcing engagement for Dell. Work activity requires leadership of key IT Security governance processes, designing of security processes, enhancement of IT Security policies and analysis of escalated security threats for strategic countermeasures. • Certifications – CISSP; CISM; C|CISO; ITILv3; Six Sigma Green Belt • Education – Michigan State University – Bachelor of Science; Walsh College of Accountancy & Business Administration – Master of Science; Thunderbird Gavin International Institute – Executive Leadership Program • Contact – robert_pace@dell.com; (972) 577-5842
  • 5. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 5 Data extracted from 2014 Global Report on the Cost of Cyber Crime, published by the Ponemon Institute No Decrease in Cyber Attacks “…..In our studies we look at 9 different attack vectors as the source of the cyber crime. This year, the benchmark sample of 257 organizations experienced 429 discernible cyber attacks or 1.6 attacks per company each week. The list below shows the number of successful attacks for the past three years, which has steadily increased.” • FY 2014, 429 attacks in 257 organizations or 1.7 successful attacks per company each week • FY 2013, 343 attacks in 234 organizations or 1.4 successful attacks per company each week • FY 2012, 262 attacks in 199 organizations or 1.3 successful attacks per company each week Types of Attacks Cost of Cyber Crime IT Security Spend Embracing Big Data – People, Process & Technology
  • 6. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 6 Embracing Big Data – People, Process & Technology Available Data - Corp & Business Centric HR – Human Capital; Job Roles Supply Chain; Vendor Mgmt; Contracts;PMO Info Security Policies/Stds AV; Encryption; IDS/IPS; DB; Mainframe; MDM File Integrity; HIDS; NIDS; Content Filtering; FW; NAC; Scanning Actions; DLP; Identity Mgmt; Industry Trends Big Data View Collection of data from multiple sources in an effort to gain better intelligence Deliverable - IT Security Team Analyzes; Directs Remediation
  • 7. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 7 Embracing Big Data – People, Process & Technology Source: Dell SecureWorks Threat Analysis Increasing Amount of Questions – Primary Driver for Embracing “BIG DATA”
  • 8. @NTXISSA Sample Definitions of Big Data and Information Security
  • 9. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 9 Embracing Big Data – People, Process & Technology •A new attitude by businesses, non-profits, government agencies, and individuals that combining data from multiple sources could lead to better decisions. •An all-encompassing term for any collection of data sets so large and complex that it becomes difficult to process them using traditional data processing applications. •Volume; Variety; Velocity; Variability; Veracity; Value Big Data •The practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data •Cornerstone concepts in the variety of definitions – Confidentiality, Integrity & Availability Information Security
  • 10. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 10 Embracing Big Data – People, Process & Technology
  • 11. @NTXISSA Big Data NTX ISSA Cyber Security Conference – April 24-25, 2015 11 Embracing Big Data – People, Process & Technology Big Data • SIEM Data • Vulnerability Scanning • Application Scanning • Network Access Control • MDM/MAM Big Data • GRC Application • Asset Management (HW/SW) • Incident Management • Patch Management • Identity & Access Management Security Program Requires “Big Data” Coordination with Organizational Maturity & Data Governance
  • 12. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 12 Embracing Big Data – People, Process & Technology People; PROCESS & Technology Leveraging the V’s of “Big Data” to Enhance Context of Risk Definition “IMPACT” X “PROBABILITY” = RISK Actionable Information “VALUE” Monitoring & Logging Incident Management Asset Mgmt Organizational Infusion Threat Intelligence Dynamic Reporting Emergence of Security Business Intelligence - SBI
  • 13. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 13 Embracing Big Data – People, Process & Technology People; Process & TECHNOLOGY Technology • Leveraging technologies used by Marketing & Advertisers • NoSQL, Hadoop, MapReduce, etc. • Accustomed to working with Petabytes, Adaptable Structure & Automation Yielding Increased Security Posture Big Data • GRC Application • Asset Management (HW/SW) • Incident Management • Patch Management • SIEM Data • Identity & Access Management • Vulnerability Scanning • Application Scanning • Wireless Detection Scanning • Security Awareness Training
  • 14. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 14 Embracing Big Data – People, Process & Technology http://www.dataversity.net/big-data-demystified-market-analysis-and-business-potential/ Internet of Things • All Market Segments Contributing Marketing & Advertising • Deeper Understanding of “Big Data” • Centered on Yielding Business Objectives Diverseness of Landscape & Expected Volumes To Increase Exponentially
  • 15. @NTXISSA Industry Views ofBig Data and Information Security
  • 16. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 16 Embracing Big Data – People, Process & Technology • Presentation at RSA Conference 2014 on Big Data • Term Security Business Intelligence floated as new type of analysis needed • Structure of heavy duty processor to effectively process the data in a timely manner View of what Intel is considering ~ SBI centered on protection of their “ Intellectual Property”
  • 18. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 18 Embracing Big Data – People, Process & Technology Advertising & Marketing Techniques • Understand data mining • Enormous capacities Creative Thinking • There is “no-box” • Agile and Adaptable to the situation…. • More self-healing controls Data Structures • Large collection, unbounded • Schema on “Write” vs on the “Read” New Talent Level • Heavy analytic skills • Data Miners with Big Data Certifications • Will learn Information Security….not core skill Information Security Transformation... “Radical Thinking” Potential Challenges & Risks for SBI and Big Data PEOPLE; Process & Technology
  • 19. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 19 Embracing Big Data – People, Process & Technology Questions
  • 20. @NTXISSA@NTXISSA The Collin College Engineering Department Collin College Student Chapter of the North Texas ISSA North Texas ISSA (Information Systems Security Association) NTX ISSA Cyber Security Conference – April 24-25, 2015 20 Thank you