Stitched in a Security Fabric: Big Data Veracity NIST BGWG

Size: px
Start display at page:

Download "Stitched in a Security Fabric: Big Data Veracity NIST BGWG"

Transcription

1 Stitched in a Security Fabric: Big Data Veracity NIST BGWG

2 Mark Underwood CEO Business Process Architect DHS/DOD Cybersecurity R&D CEP AI JIT Learning Business Intelligence QlikView consultant at Honda, Qualcomm Cover Big Data public companies for OTR Global

3

4

5 What provenance do you see?

6 Peel the Onion Exchangeable image file (EXIF) data Geolocation Image feature extraction

7 Big Data GRC and Forensics Premise: Complete logging, audit and forensics for a Big Data system could be Bigger (along some V dimension) than the system itself. Provenance may have temporal contexts If consideration of these possible needs was not made at design time.

8 Providential w/o Providence

9 Air France 447

10 Airbus A330 Cockpit

11 Alt 1 Alternate law 1 (ALT1) mode combines a Normal Law lateral mode with the load factor, bank angle protections retained. High angle of attack protection may be lost and low energy (level flight stall) protection is lost. High speed and high angle of attack protections enter alternative law mode. ALT1 may be entered if there are faults in the horizontal stabilizer, an elevator, yaw damper actuation, slat or flap sensor, or a single air data reference fault. Wikipedia Imai, S., Klockowski, R., Varela, C. A., Dec Self Healing spatiotemporal data streams using error signatures. In: Computational Science and Engineering (CSE), 2013 IEEE 16th International Conference on. pp URL

12 You be the pilot You encounter turbulence Alt 1 is engaged by avionics software Some readings look wrong Some readings look right What does your training say?

13 Software Behavior? What should software do?

14 Real time analytics

15 AeroPerú Flight 603

16 Android Wear Body sensing networks

17 Metadata to the Rescue?

18 Old School Lessons Know your data Garbage in Garbage Out Missing data can mean lots of things: Lost measurement Trigger to obtain similar data from another source Not applicable Data profiling Machine learning of data Failure analysis No direct access to data w/o mediation Link to ontologies / Linked Data Application Design

19 What goes unreported?

20 New School Lessons Data never dies. This is new! Cascading failure is not all that unusual Superstorm Sandy: No power for 10 days at Power Telecommunications Fuel (Supply Chain interruptions) Panic (Consumption spikes, hoarding) Systems Big Data Included are Systems + People 9/11 Connect the Dots under duress? Metadata could be as large as the Big Data Provenance failure can have many causes! Pessimism

21 Smarter Attacks on Smart Grids?

22 Big Data Attack Surface: Big Every end point Every application Data in any storage mechanism Any component component interface Compromised penetrations could be more difficult to localize Pen testing is unwieldy maybe impossible for some settings Resilience testing for Big Data for some applications may have no precedent e.g., testing for specific types of failure Attack concealment may be facilitated by lack of temporal metadata e.g., release management

23 Copy the Whole Instance Recreation of some data may require a copy of the code, data and instrumentation that created the data. Recalibrate what calibration means in Big Data systems Security & Privacy test points need to be design features Forward and backward provenance flow Needs for app development environments may overlap Needed for forensics

24 PII Portals Citizens and patients will demand accountability for the privacy data even if they have technically agreed to give it up Tolerance for incorrect PII data will be lower than for credit reporting Firms may need to build internal systems that anticipate security lapses in Big Data because risks are correspondingly Big

25 Provenance in S&P Fabric Consider existing solutions, extended for Big Data RA Prov4J Allows expressive provenance queries Leverage semantic web to ease management challenges for provenance data Provide mechanisms for capturing provenance data Discovery mechanisms for provenance descriptors on the Web Open Provenance Model escience workflow focus SPADE SRI provenance collection and management system Notion of provenance tracing PAFS Provenance Aware DFS

Security Analytics for Smart Grid

Security Analytics for Smart Grid Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC robert.griffin@rsa.com blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Are You Ready for Big Data?

Are You Ready for Big Data? Are You Ready for Big Data? Jim Gallo National Director, Business Analytics April 10, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?

More information

Are You Ready for Big Data?

Are You Ready for Big Data? Are You Ready for Big Data? Jim Gallo National Director, Business Analytics February 11, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?

More information

Smarter Planet evolution

Smarter Planet evolution Smarter Planet evolution 13/03/2012 2012 IBM Corporation Ignacio Pérez González Enterprise Architect ignacio.perez@es.ibm.com @ignaciopr Mike May Technologies of the Change Capabilities Tendencies Vision

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Information Security, PII and Big Data

Information Security, PII and Big Data ITU Workshop on ICT Security Standardization for Developing Countries (Geneva, Switzerland, 15-16 September 2014) Information Security, PII and Big Data Edward (Ted) Humphreys ISO/IEC JTC 1/SC 27 (WG1

More information

WESTAC 2015 Fall Member Forum Paul Bingham, Economic Development Research Group. Calgary, Alberta November 10, 2015

WESTAC 2015 Fall Member Forum Paul Bingham, Economic Development Research Group. Calgary, Alberta November 10, 2015 WESTAC 2015 Fall Member Forum Paul Bingham, Economic Development Research Group Calgary, Alberta November 10, 2015 Operations and planning for the freight transport system is fragmented reflecting the

More information

Sustainable Development with Geospatial Information Leveraging the Data and Technology Revolution

Sustainable Development with Geospatial Information Leveraging the Data and Technology Revolution Sustainable Development with Geospatial Information Leveraging the Data and Technology Revolution Steven Hagan, Vice President, Server Technologies 1 Copyright 2011, Oracle and/or its affiliates. All rights

More information

Exploiting the power of Big Data

Exploiting the power of Big Data Exploiting the power of Big Data Timos Sellis School of Computer Science and Information Technology timos.sellis@rmit.edu.au ITECHLAW Asia-Pacific Conference, February 26-28, 2014 Melbourne Australia Timeline

More information

Transportation Research Board 2015 Summer Midyear Meeting - Freight Systems and Marine Groups Paul Bingham, Economic Development Research Group

Transportation Research Board 2015 Summer Midyear Meeting - Freight Systems and Marine Groups Paul Bingham, Economic Development Research Group Transportation Research Board 2015 Summer Midyear Meeting - Freight Systems and Marine Groups Paul Bingham, Economic Development Research Group Washington, DC June 25, 2015 Activities enhanced or newly

More information

Smart Cities Challenge ASSOCIATION FOR COMMUTER TRANSPORTATION BEST WORKPLACES FOR COMMUTERS

Smart Cities Challenge ASSOCIATION FOR COMMUTER TRANSPORTATION BEST WORKPLACES FOR COMMUTERS Smart Cities Challenge ASSOCIATION FOR COMMUTER TRANSPORTATION BEST WORKPLACES FOR COMMUTERS Agenda What is the Smart Cities Challenge The Nuts & Bolts How you can get involved in the Smart Cities Challenge

More information

Advancing Sustainability with Geospatial Steven Hagan, Vice President, Server Technologies João Paiva, Ph.D. Spatial Information and Science

Advancing Sustainability with Geospatial Steven Hagan, Vice President, Server Technologies João Paiva, Ph.D. Spatial Information and Science Advancing Sustainability with Geospatial Steven Hagan, Vice President, Server Technologies João Paiva, Ph.D. Spatial Information and Science Engineering 1 Copyright 2011, Oracle and/or its affiliates.

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

Big Data and the new trends for BI and Analytics Juha Teljo Business Intelligence and Predictive Solutions Executive IBM Europe

Big Data and the new trends for BI and Analytics Juha Teljo Business Intelligence and Predictive Solutions Executive IBM Europe Big Data and the new trends for BI and Analytics Juha Teljo Business Intelligence and Predictive Solutions Executive IBM Europe 2012 IBM Corporation The Mega Trends Cloud Mobile Social Analytics 2014 International

More information

Challenges for Provenance in Cloud Computing

Challenges for Provenance in Cloud Computing Challenges for Provenance in Cloud Computing Imad M. Abbadi and John Lyle Department of Computer Science, University of Oxford Email: firstname. lastname @cs.ox.ac.uk Abstract Many applications which require

More information

When Security, Privacy and Forensics Meet in the Cloud

When Security, Privacy and Forensics Meet in the Cloud When Security, Privacy and Forensics Meet in the Cloud Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG March 26,

More information

BIG DATA: PROMISE, POWER AND PITFALLS NISHANT MEHTA

BIG DATA: PROMISE, POWER AND PITFALLS NISHANT MEHTA BIG DATA: PROMISE, POWER AND PITFALLS NISHANT MEHTA Agenda Promise Definition Drivers of and for Big Data Increase revenue using Big Data Power Optimize operations and decrease costs Discover new revenue

More information

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 www.vitria.com TABLE OF CONTENTS I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 III. COMPLEMENTING UTILITY IT ARCHITECTURES WITH THE VITRIA PLATFORM FOR

More information

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing

More information

Smart Cities. Photo used under Creative Commons from nigelhowe

Smart Cities. Photo used under Creative Commons from nigelhowe Smart Cities Photo used under Creative Commons from nigelhowe Photo used under Creative Commons from tim-166 Cities are for People Citier Smart cities as a web of people, things and services Workshop 2,

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

Big Data Analytics Platform @ Nokia

Big Data Analytics Platform @ Nokia Big Data Analytics Platform @ Nokia 1 Selecting the Right Tool for the Right Workload Yekesa Kosuru Nokia Location & Commerce Strata + Hadoop World NY - Oct 25, 2012 Agenda Big Data Analytics Platform

More information

NIST Big Data Public Working Group

NIST Big Data Public Working Group NIST Big Data Public Working Group Requirements May 13, 2014 Arnab Roy, Fujitsu On behalf of the NIST BDWG S&P Subgroup S&P Requirements Emerging due to Big Data Characteristics Variety: Traditional encryption

More information

The IoT Inc Business Meetup Silicon Valley

The IoT Inc Business Meetup Silicon Valley The IoT Inc Business Meetup Silicon Valley Meeting 6 February 2015 Bruce Sinclair (Organizer): bruce@iot-inc.com Target of Meetup For business people selling products and services into IoT but of course

More information

Comprehensive Analytics on the Hortonworks Data Platform

Comprehensive Analytics on the Hortonworks Data Platform Comprehensive Analytics on the Hortonworks Data Platform We do Hadoop. Page 1 Page 2 Back to 2005 Page 3 Vertical Scaling Page 4 Vertical Scaling Page 5 Vertical Scaling Page 6 Horizontal Scaling Page

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Craig McWilliams Craig Burrell. Bringing Smarter, Safer Transport to NZ

Craig McWilliams Craig Burrell. Bringing Smarter, Safer Transport to NZ Craig McWilliams Craig Burrell Bringing Smarter, Safer Transport to NZ World Class Transport. Smarter, Stronger, Safer. Bringing Smarter Safer Transport to NZ Craig Burrell Infrastructure Advisory Director

More information

Bringing Strategy to Life Using an Intelligent Data Platform to Become Data Ready. Informatica Government Summit April 23, 2015

Bringing Strategy to Life Using an Intelligent Data Platform to Become Data Ready. Informatica Government Summit April 23, 2015 Bringing Strategy to Life Using an Intelligent Platform to Become Ready Informatica Government Summit April 23, 2015 Informatica Solutions Overview Power the -Ready Enterprise Government Imperatives Improve

More information

Converged, Real-time Analytics Enabling Faster Decision Making and New Business Opportunities

Converged, Real-time Analytics Enabling Faster Decision Making and New Business Opportunities Technology Insight Paper Converged, Real-time Analytics Enabling Faster Decision Making and New Business Opportunities By John Webster February 2015 Enabling you to make the best technology decisions Enabling

More information

Smart Cities. And open standards. Kerry Taylor, University of Surrey

Smart Cities. And open standards. Kerry Taylor, University of Surrey Smart Cities And open standards Kerry Taylor, University of Surrey How is a city smart? Citizens informed and in control Government informed and just-enough in control Environmentally and healthsensitive

More information

Rapid Modular Software Integration (RMSI)

Rapid Modular Software Integration (RMSI) Rapid Modular Software Integration (RMSI) Adam Grimm adam.grimm@kihomac.com Overview RMSI Overview Future Airborne Compatibility Environment (FACE ) Analog Computer Rehost Integration of Modular Components

More information

IANS Information Security Forum. 2015 Curriculum

IANS Information Security Forum. 2015 Curriculum 2015 IANS Information Security Forum 2015 Curriculum IANS Forums: A Unique Experience This is not your typical industry or technology event. IANS Information Security Forums deliver a unique experience

More information

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by

!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by White Paper Understanding The Role of Data Governance To Support A Self-Service Environment Sponsored by Sponsored by MicroStrategy Incorporated Founded in 1989, MicroStrategy (Nasdaq: MSTR) is a leading

More information

Product Overview. Dream Report. OCEAN DATA SYSTEMS The Art of Industrial Intelligence. User Friendly & Programming Free Reporting.

Product Overview. Dream Report. OCEAN DATA SYSTEMS The Art of Industrial Intelligence. User Friendly & Programming Free Reporting. Dream Report OCEAN DATA SYSTEMS The Art of Industrial Intelligence User Friendly & Programming Free Reporting. Dream Report for Trihedral s VTScada Dream Report Product Overview Applications Compliance

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

The Internet of Things:

The Internet of Things: The Internet of Things: What Does it Take to Make the Internet of Everything Real? Kip Compton, VP Internet of Things (IoT) Systems and Software Group @kipcompton www.linkedin.com/in/kipcompton/en Are

More information

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that

More information

Discover & Investigate Advanced Threats. OVERVIEW

Discover & Investigate Advanced Threats. OVERVIEW Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 11 (Part II) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411

More information

BIG (SMART) DATA ANALYTICS IN ENERGY TRENDS AND BENEFITS

BIG (SMART) DATA ANALYTICS IN ENERGY TRENDS AND BENEFITS BIG (SMART) DATA ANALYTICS IN ENERGY TRENDS AND BENEFITS SAS INSTITUTE 360 POWER FOR AN INTEGRATED COMPANY MANAGEMENT Customer around the globe trust SAS at more than 65.000 locations 91 of Top100 FORTUNE

More information

BIG DATA AND THE ENTERPRISE DATA WAREHOUSE WORKSHOP

BIG DATA AND THE ENTERPRISE DATA WAREHOUSE WORKSHOP BIG DATA AND THE ENTERPRISE DATA WAREHOUSE WORKSHOP Business Analytics for All Amsterdam - 2015 Value of Big Data is Being Recognized Executives beginning to see the path from data insights to revenue

More information

A modern tool to secure future profit and customer satisfaction Gymtech Innovation through digital technology

A modern tool to secure future profit and customer satisfaction Gymtech Innovation through digital technology A modern tool to secure future profit and customer satisfaction Gymtech Innovation through digital technology Targets we are hitting vision & mission VISION Providing a sixth sense of understanding by

More information

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Panel Session: Lessons Learned in Smart Grid Cybersecurity PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory

More information

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a

More information

NIST Big Data PWG & RDA Big Data Infrastructure WG: Implementation Strategy: Best Practice Guideline for Big Data Application Development

NIST Big Data PWG & RDA Big Data Infrastructure WG: Implementation Strategy: Best Practice Guideline for Big Data Application Development NIST Big Data PWG & RDA Big Data Infrastructure WG: Implementation Strategy: Best Practice Guideline for Big Data Application Development Wo Chang wchang@nist.gov National Institute of Standards and Technology

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

How To Create A Data Science System

How To Create A Data Science System Enhance Collaboration and Data Sharing for Faster Decisions and Improved Mission Outcome Richard Breakiron Senior Director, Cyber Solutions Rbreakiron@vion.com Office: 571-353-6127 / Cell: 803-443-8002

More information

Smart Metering and RF Mesh Networks for Communities

Smart Metering and RF Mesh Networks for Communities Smart Metering and RF Mesh Networks for Communities AMI RF Mesh Networks Wireless neighborhood networks (typical) Attractive bandwidth/cost trade off Signal penetration Path diversity (reliability) Self

More information

Accenture Cyber Security Transformation. October 2015

Accenture Cyber Security Transformation. October 2015 Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting

More information

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

A Big Picture for Big Data

A Big Picture for Big Data Supported by EU FP7 SCIDIP-ES, EU FP7 EarthServer A Big Picture for Big Data FOSS4G-Europe, Bremen, 2014-07-15 Peter Baumann Jacobs University rasdaman GmbH p.baumann@jacobs-university.de Our Stds Involvement

More information

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data: Global Digital Data Growth Growing leaps and bounds by 40+% Year over Year! 2009 =.8 Zetabytes =.08

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

Introduction Jim Rowland, Senior System Architect and Project Manager Daly

Introduction Jim Rowland, Senior System Architect and Project Manager Daly Introduction Jim Rowland, Senior System Architect and Project Manager Daly Stepping Up to Enterprise Vulnerability Management Keren Cummins, Director, Federal and MidAtlantic Markets ncircle Presentation

More information

BIG Big Data Public Private Forum

BIG Big Data Public Private Forum DATA STORAGE Martin Strohbach, AGT International (R&D) THE DATA VALUE CHAIN Value Chain Data Acquisition Data Analysis Data Curation Data Storage Data Usage Structured data Unstructured data Event processing

More information

THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE

THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE BIG DATA ANALYTICS SCOPING REPORT July 20, 2015 DRAFT THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE BIG

More information

QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM

QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM QlikView Technical Case Study Series Big Data June 2012 qlikview.com Introduction This QlikView technical case study focuses on the QlikView deployment

More information

Industry Impact of Big Data in the Cloud: An IBM Perspective

Industry Impact of Big Data in the Cloud: An IBM Perspective Industry Impact of Big Data in the Cloud: An IBM Perspective Inhi Cho Suh IBM Software Group, Information Management Vice President, Product Management and Strategy email: inhicho@us.ibm.com twitter: @inhicho

More information

Enhancing Cybersecurity with Big Data: Challenges & Opportunities

Enhancing Cybersecurity with Big Data: Challenges & Opportunities Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The

More information

Turning Big Data into a Big Opportunity

Turning Big Data into a Big Opportunity Customer-Centricity in a World of Data: Turning Big Data into a Big Opportunity Richard Maraschi Business Analytics Solutions Leader IBM Global Media & Entertainment Joe Wikert General Manager & Publisher

More information

Applying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS

Applying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS Applying ICT and IoT to Multifamily Buildings U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS ETS is an Energy Technology, Behavior Management, and

More information

Smart City Live! 9-10 May 2016, Nice

Smart City Live! 9-10 May 2016, Nice Monday, May 9, 2016 Smart City Live! 9-10 May 2016, Nice Draft agenda as of November 20, 2015 SMART LIVING SMART CITY SERVICES 9:00 AM CASE STUDY: Developing Smart Energy communities Understanding the

More information

Realizing Business Value from Convergence of IoT + Big Data Technologies. Aditya Thadani Phil Andreoli

Realizing Business Value from Convergence of IoT + Big Data Technologies. Aditya Thadani Phil Andreoli Realizing Business Value from Convergence of IoT + Big Data Technologies Aditya Thadani Phil Andreoli CONVERGENCE OF IOT+BIG DATA TECHNOLOGIES Agenda Business Opportunity & Outcomes Where does IoT (Internet

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

How the oil and gas industry can gain value from Big Data?

How the oil and gas industry can gain value from Big Data? How the oil and gas industry can gain value from Big Data? Arild Kristensen Nordic Sales Manager, Big Data Analytics arild.kristensen@no.ibm.com, tlf. +4790532591 April 25, 2013 2013 IBM Corporation Dilbert

More information

Big Data and Analytics: Challenges and Opportunities

Big Data and Analytics: Challenges and Opportunities Big Data and Analytics: Challenges and Opportunities Dr. Amin Beheshti Lecturer and Senior Research Associate University of New South Wales, Australia (Service Oriented Computing Group, CSE) Talk: Sharif

More information

Data Analytics for a Secure Smart Grid

Data Analytics for a Secure Smart Grid Data Analytics for a Secure Smart Grid Dr. Silvio La Porta Senior Research Scientist EMC Research Europe Ireland COE. Agenda APT modus operandi Data Analysis and Security SPARKS Data Analytics Module Anatomy

More information

Life in the Cloud A Service Provider s View. Michael Smith mismith@akamai.com Security Evangelist

Life in the Cloud A Service Provider s View. Michael Smith mismith@akamai.com Security Evangelist Life in the Cloud A Service Provider s View Michael Smith mismith@akamai.com Security Evangelist 1 Agenda Cloud is Secure, Right? Building a Cloud Security Program Security Program Case Study Features,

More information

A Study on Security and Privacy in Big Data Processing

A Study on Security and Privacy in Big Data Processing A Study on Security and Privacy in Big Data Processing C.Yosepu P Srinivasulu Bathala Subbarayudu Assistant Professor, Dept of CSE, St.Martin's Engineering College, Hyderabad, India Assistant Professor,

More information

From Big Data to Smart Data Thomas Hahn

From Big Data to Smart Data Thomas Hahn Siemens Future Forum @ HANNOVER MESSE 2014 From Big to Smart Hannover Messe 2014 The Evolution of Big Digital data ~ 1960 warehousing ~1986 ~1993 Big data analytics Mining ~2015 Stream processing Digital

More information

Reactive Applications: What if Your Internet of Things has 1000s of Things?

Reactive Applications: What if Your Internet of Things has 1000s of Things? Reactive Applications: What if Your Internet of Things has 1000s of Things? dean.wampler@typesafe.com @deanwampler Photographs licensed from istock unless otherwise noted. Characteristics of Large IoT

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

Cybersecurity Analytics for a Smarter Planet

Cybersecurity Analytics for a Smarter Planet IBM Institute for Advanced Security December 2010 White Paper Cybersecurity Analytics for a Smarter Planet Enabling complex analytics with ultra-low latencies on cybersecurity data in motion 2 Cybersecurity

More information

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

A New Era of Cybersecurity Neil Mohammed, Sales Engineer A New Era of Cybersecurity Neil Mohammed, Sales Engineer Copyright 2015 Raytheon Company. All rights reserved. R W Market Advantages Strong Financial Backing Accelerated Innovation Increased Breadth and

More information

WEB Penetration Testing

WEB Penetration Testing FTA Annual Conference WEB Penetration Testing and Vulnerability Analysis June 10, 2008 Timothy R. Blevins, KDOR Chief Information Officer 1 WEB Penetration Testing What is WEB Penetration Testing? When

More information

Big Data, Integration and Governance: Ask the Experts

Big Data, Integration and Governance: Ask the Experts Big, Integration and Governance: Ask the Experts January 29, 2013 1 The fourth dimension of Big : Veracity handling data in doubt Volume Velocity Variety Veracity* at Rest Terabytes to exabytes of existing

More information

Integrating Data Life Cycle into Mission Life Cycle. Arcot Rajasekar rajasekar@unc.edu sekar@diceresearch.org

Integrating Data Life Cycle into Mission Life Cycle. Arcot Rajasekar rajasekar@unc.edu sekar@diceresearch.org Integrating Data Life Cycle into Mission Life Cycle Arcot Rajasekar rajasekar@unc.edu sekar@diceresearch.org 1 Technology of Interest Provide an end-to-end capability for Exa-scale data orchestration From

More information

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9

More information

The Future of Work reinven1ng every industry as we know it The Future of Work reinven1ng every industry as we know it.

The Future of Work reinven1ng every industry as we know it The Future of Work reinven1ng every industry as we know it. The Future of Work reinven1ng every industry as we know it The Future of Work reinven1ng every industry as we know it Steve Sargent Trends that are shaping today and our future Increasing government involvement

More information

Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes

Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes Highly competitive enterprises are increasingly finding ways to maximize and accelerate

More information

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE

More information

INSPIRE 1 Release Notes 2015.9.7. Overview: What s New: Bug Fixes: Notice: 1. All-in-One Firmware version updated to: v1.4.0.10

INSPIRE 1 Release Notes 2015.9.7. Overview: What s New: Bug Fixes: Notice: 1. All-in-One Firmware version updated to: v1.4.0.10 2015.9.7 1. All-in-One Firmware version updated to: v1.4.0.10 What s New: 1. Added Intelligent Navigation Modes including Point of Interest and Waypoint. 2. A three minute cool down period is triggered

More information

Dream Report. Industrial and Municipal. Water and Wastewater. OCEAN DATA SYSTEMS The Art of Industrial Intelligence

Dream Report. Industrial and Municipal. Water and Wastewater. OCEAN DATA SYSTEMS The Art of Industrial Intelligence Dream Report OCEAN DATA SYSTEMS The Art of Industrial Intelligence User Friendly & Programming Free Reporting. Water and Wastewater Industrial and Municipal Applications 40-CFR-141 EPA and State Reports

More information

Exploiting Data at Rest and Data in Motion with a Big Data Platform

Exploiting Data at Rest and Data in Motion with a Big Data Platform Exploiting Data at Rest and Data in Motion with a Big Data Platform Sarah Brader, sarah_brader@uk.ibm.com What is Big Data? Where does it come from? 12+ TBs of tweet data every day 30 billion RFID tags

More information

Industry Data Model Solution for Smart Grid Data Management Challenges

Industry Data Model Solution for Smart Grid Data Management Challenges Industry Data Model Solution for Smart Grid Data Management Challenges Presented by: M. Joe Zhou & Tom Eyford UCAiug Summit 2012, New Orleans, LA October 23, 2012 UCAiug Summit 2012, New Orleans, LA 1

More information

The Role of Security Monitoring & SIEM in Risk Management

The Role of Security Monitoring & SIEM in Risk Management The Role of Security Monitoring & SIEM in Risk Management Jeff Kopec, MS, CISSP Cyber Security Architect Oakwood Healthcare Jeff Bell, CISSP, GSLC, CPHIMS, ACHE Director, IT Security & Risk Services CareTech

More information

Lexmark Enterprise Software. Transforming customer engagement

Lexmark Enterprise Software. Transforming customer engagement Lexmark Enterprise Software Transforming customer engagement Customer relationships are the lifeblood of your business Whether you serve businesses, consumers, patients, students or citizens, the quality

More information

The Internet of Things

The Internet of Things The Internet of Things The Power of Actionable Insight An introduction to the Internet of Things Chris Vetor Business Unit Executive, WW Programs cvetor@us.ibm.com More and more of the world s activity

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Implementing Geospatial Data in Parametric Environment Elçin ERTUĞRUL*

Implementing Geospatial Data in Parametric Environment Elçin ERTUĞRUL* Proceedings of the International Association for Shell and Spatial Structures (IASS) Symposium 2015, Amsterdam 17-20 August 2015, Amsterdam, The Netherlands Implementing Geospatial Data in Parametric Environment

More information

Leveraging the Internet of Things in Marketing

Leveraging the Internet of Things in Marketing Leveraging the Internet of Things in Marketing Index 3 3 4 4 5 5 6 6 Introduction The Internet of Things outlook IoT and marketing Wearables: Reaching customers anywhere Location-based marketing RFID tags

More information

Deloitte Discovery Caribbean & Bermuda Territory Guide

Deloitte Discovery Caribbean & Bermuda Territory Guide Deloitte Discovery Caribbean & Bermuda Territory Guide Deloitte Discovery Overview The complexity and volume of data in today s corporate climate means businesses in the Caribbean & Bermuda Countries (

More information

Standardization Requirements Analysis on Big Data in Public Sector based on Potential Business Models

Standardization Requirements Analysis on Big Data in Public Sector based on Potential Business Models , pp. 165-172 http://dx.doi.org/10.14257/ijseia.2014.8.11.15 Standardization Requirements Analysis on Big Data in Public Sector based on Potential Business Models Suwook Ha 1, Seungyun Lee 2 and Kangchan

More information

Microsoft Private Cloud

Microsoft Private Cloud Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.

More information

A Tipping Point for Automation in the Data Warehouse. www.stonebranch.com

A Tipping Point for Automation in the Data Warehouse. www.stonebranch.com A Tipping Point for Automation in the Data Warehouse www.stonebranch.com Resolving the ETL Automation Problem The pressure on ETL Architects and Developers to utilize automation in the design and management

More information

Challenges of Analytics

Challenges of Analytics Challenges of Analytics Setting-up a Data Science Team BA4ALL Eindhoven November 2015 Laurent FAYET CEO @lbfayet www.artycs.eu 1 Agenda 1 About ARTYCS 2 Definitions 3 Data Value Creation 4 An Approach

More information