MASSIF: A Promising Solution to Enhance Olympic Games IT Security
|
|
- Charlene McDonald
- 8 years ago
- Views:
Transcription
1 MAnagementof Security information and events in Service InFrastructures MASSIF: A Promising Solution to Enhance Olympic Games IT Security 7th ICGS3 / 4th e-democracy Joint Conferences 2011 August 25 th Thessaloniki (Greece) Elsa Prieto (Atos), R.Díaz (Atos), L.Romano (CINI), R. Rieke (Fraunhofer), M.Achemlal (F. Telecom). Project funded by the European Commission ICT workprogramme 2009 (FP7-ICT )
2 Outlook Olympic Games scenario MASSIF overview and proposal MASSIF progress and next steps 2
3 The Olympic Game Scenario 3
4 The Olympic Games in Numbers Vancouver 2010 Olympic Winter Games Coverage on 300 TV stations 3.5 billion worldwide television viewers 17 daysof competition 50,000 workforce members 50,000 hours of total broadcast 9 venues 275 million visitors in total to official website 96,409 people accredited 15 sport disciplines 10,800 media representatives more than 100 websites worldwide Source: Vancouver Organizing Committee ( 4
5 Olympic Games IT Infrastructure Objective: protect the IT infrastructure from any undesired and/or uncontrolled phenomena which can impact any parts of the result chain and associated services. 5
6 The Olympic Security Infrastructure (AHPS) Atos High Performance Security (AHPS): Millions of raw events reduced to a few considered critical with no impact on the Olympic Games. Challenges and limitations: Need for real-time solutions to Security Events. The number of security event types. The amount of generated events to be handled. Security is focused on Logical (IT) security. Limited service level (business process) events correlation: technology focused. Misuse cases (e.g: low & slow attacks) correlate d events alarms 201 million filtered events 90 critical events 6
7 MASSIF Overview & Proposal 7
8 Why MASSIF? Management of incidents and events (SIEM) Near-real time notification; Proactive management of incidents and events. Limitations of current SIEM solutions: Restriction to infrastructure Inability to interpret events and incidents from other layers Inability to provide high degree if trustworthiness or resilience in the event collection environment No scalability to provide posture of the environments when considering global deployment of ICT infrastructure. 8
9 MASSIF Objectives Development of a new generation SIEM framework for service infrastructures. Security event processing: multi-domain multi-level scalable elastic and distributed intelligent Predictive security monitoring. Trustworthiness & resilience of event collection framework 9
10 MASSIF results will be demonstrated in: Four field scenarios: MASSIF scenarios Olympic Games IT infrastructure Mobile phone based money transfer service Managed Enterprise Service Infrastructures Critical infrastructure process control Existing OS SIEM solutions: 10
11 MASSIF Architecture Overview 11
12 MASSIF Challenges Minimum impact on the monitored system. Collection (Generic Event Translator) High interoperability: heterogeneity of input sources (adaptable parsers) High scalability: handle and propagation of load peaks (no loss). Smart probes (complex event patterns) Processing (engine). High scalability: 100s of thousands of events per second. Parallelization in distributed collectors in a computing cloud. Elasticity: coupling the flow of events. Correlation: Cross-layer: logical security, physical security and service layer. 12
13 MASSIF Challenges (II) Predictive security monitoring: Attack/Process models to derive near-future security problems. Countermeasures selection (ontology-driven). Resilience: Resilient Event Bus (suite of protocols) to secure the information flow. MASSIF Information Switches (MIS) - MASSIF Information Agents (MIA). Overlay network able to deliver messages in a securely and timely way. Incremental resilience strategies. Trusted timestamp. Sensitive Information (forensic support) Least persistence principle. Privacy. Authenticity, confidentiality and unforgeability. 13
14 MASSIF Progress & Next Steps 14
15 2011: 2012: 2013: MASSIF Progress & Next Steps Scenarios characterization. Design & initial developments. Developments Tool adaptation & Integration. First MASSIF workshop. Final developments & integration. Adaptation to scenarios & Evaluation of results Final MASSIF Workshop. Our ambition is to leverage MASSIF results for future Olympic Games events. 15
16 Project Coordinator Contacts Pedro SORIA Scientific Coordinator Technical Coordinator Roland RIEKE Hervé DEBAR Project Website: 16
17 Thank you for your attention! Elsa PRIETO. 17
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
More informationPRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS
PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS www.massif-project.eu Dr Andrew Hutchison T-Systems (andrew.hutchison@t-systems.com) MAanagement of Security information and events
More informationEnhancing Security and Trustworthiness with Next-Generation Security Information and Event Management
WHITE PAPER Enhancing Security and Trustworthiness with Next-Generation Security Information and Event Management June 2012 MASSIF is a project co-funded under contract FP7-257475 of the Seventh Framework
More informationSecurity and Reliability Requirements for Advanced Security Event Management
c 2012 Springer-Verlag. This is an author-created version of the work with DOI: 10.1007/978-3-642-33704-8 15. The original publication is available at www.springerlink.com. http://link.springer.com/chapter/10.1007%2f978-3-642-33704-8_15
More informationUsing MASSIF to Protect a Critical Infrastructure: Dam Use Case
Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Luigi Coppolino Epsilon Srl Advanced Security Event Management of Complex Systems CSP EU FORUM 24 th -25 th April, Berlin, Germany www.massif-project.eu
More informationInformation Security Management at the Olympics: Finding the Needle in the Haystack
Information Security Management at the Olympics: Finding the Needle in the Haystack Markus J. Krauss VP Cloud Computing and Service Provider mjk@netiq.com Chris Van Den Abbeele Solution Manager ISRM chris.vandenabbeele@atos.net
More informationA Resilient Protection Device for SIEM Systems
A Resilient Protection Device for SIEM Systems Nuno Neves University of Lisboa, Portugal http://www.di.fc.ul.pt/~nuno Work with: Alysson Bessani, Miguel Garcia, Eric Vial, Ricardo Fonseca, Paulo Veríssimo
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationCloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
More informationA Scalable SIEM Correlation Engine and its Application to the Olympic Games IT Infrastructure
2013 International Conference on Availability, Reliability and Security A Scalable SIEM Correlation Engine and its Application to the Olympic Games IT Infrastructure Valerio Vianello, Vincenzo Gulisano,
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationLogical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
More informationTowards Smart and Intelligent SDN Controller
Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems
More informationInformation Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov
More informationCAS8489 Delivering Security as a Service (SIEMaaS) November 2014
CAS8489 Delivering Security as a Service (SIEMaaS) November 2014 Usman Choudhary Senior Director usman@netiq.com Rajeev Khanolkar CEO SecurView Agenda What is Security Monitoring? Definition & concepts
More informationTrust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de
More informationCybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
More informationMASSIF: A Highly Scalable SIEM
MASSIF: A Highly Scalable SIEM Ricardo Jimenez-Peris Univ. Politecnica de Madrid (UPM) rjimenez@fi.upm.es DEMONS Workshop Berlin, April 25 th 2012 MASSIF in a Nutshell MASSIF aims at developing the next
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationBIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY
BIG DATA CHANGING THE REALM OF POSSIBILITY IN SECURITY Shaun McLagan General Manager, RSA Australia and New Zealand 1 Things have changed #2 Buzz word 2012 Big Data only behind something called Fiscal
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationFuture cybersecurity threats and research needs.
www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges
More informationHow Network Operators Do Prepare for the Rise of the Machines
Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases
More informationeguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success
: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success FAST FACTS Over 10 Million Windows Server 2003 Devices Still In Use Less Than 250 Days To Windows Server
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
More informationUpdate On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
More informationCISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationBoosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
More informationEoin Thornton Senior Security Architect Zinopy Security Ltd.
RSA envision: Transform your Security Operations A Technical overview & demo of RSA envision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect
More informationIdentity, Security and Risk Management. transforming. risk into. value and efficiency. Your business technologists.
Identity, Security and Risk Management transforming risk into value and efficiency Your business technologists. Powering progress Securing your business while maximizing opportunities Protecting the privacy
More informationGetting Real Real Time Data Integration Patterns and Architectures
Getting Real Real Time Data Integration Patterns and Architectures Nelson Petracek Senior Director, Enterprise Technology Architecture Informatica Digital Government Institute s Enterprise Architecture
More informationInformation & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
More informationConsor;um (partners) ARES conference Toulouse, 24 August 2015
1 2 3 Consor;um (partners) 4 The honest- but- curious CSP model (cloud service provider)? 5 an attack tolerant framework Ambi;on in the context of honest-but-curious CSPs preserving the benefits associated
More informationAssuria from ZeroDayLab
Passionate about Total Security Management Assuria from ZeroDayLab Forensic Log Management SIM/SIEM2 As one of Europe s leading IT Security Consulting companies, ZeroDayLab has been carrying out Security
More informationProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
More informationProtecting Communication in SIEM systems
Protecting Communication in SIEM systems Valerio Formicola Università di Napoli Parthenope Winter School: Hot Topics in Secure and Dependable Computing for Critical Infrastructures SDCI 2012 January 15th
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationClavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
More informationWorkprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures
Workprogramme 2013 objective 1.2 Sandro D Elia Software & Service Architectures and Infrastructures Target Outcomes Delivering services in an effective, efficient and reliable manner across the future
More informationBecome a hunter: fi nding the true value of SIEM.
Become a hunter: fi nding the true value of SIEM. When Security Information and Event Management (SIEM) hit the security scene, it was heralded as a breakthrough in threat detection. However, SIEM is just
More informationBig Data-ready, Secure & Sovereign Cloud
Copernicus Big Data Workshop Big Data-ready, Secure & Sovereign Cloud A Technology Enabler for Copernicus Data Innovation March 14 th, 2014 Brussels F. BOUJEMAA R&D Manager E. MICONNET - Head of Cyber
More informationG DATA TechPaper #0275. G DATA Network Monitoring
G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationWORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development
WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Dr. Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services, Cloud odysseas.pyrovolakis@ec.europa.eu
More informationAnalyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationThe Sumo Logic Solution: Security and Compliance
The Sumo Logic Solution: Security and Compliance Introduction With the number of security threats on the rise and the sophistication of attacks evolving, the inability to analyze terabytes of logs using
More informationLOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
More informationSport expertise. reinventing. your digital experience. with smart solutions for sport
Sport expertise reinventing your digital experience with smart solutions for sport Reinventing your digital experience with smart solutions for sport The rules of the game have changed and so has the behavior
More informationH2020 "Secure Societies" Work Programme Digital Security 2015
H2020 "Secure Societies" Work Programme Digital Security 2015 Rafael Tesoro Trust and Security Unit H.4 DG Communications Networks, Content and Technology European Commission Rafael.TESORO-CARRETERO@ec.europa.eu
More informationSafeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
More informationSoftware services competence in research and development activities at PSNC. Cezary Mazurek PSNC, Poland
Software services competence in research and development activities at PSNC Cezary Mazurek PSNC, Poland Workshop on Actions for Better Participation of New Member States to FP7-ICT Timişoara, 18/19-03-2010
More informationIBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
More informationASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach
ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall
More informationInfor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
More informationALERT LOGIC FOR HIPAA COMPLIANCE
SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationSecuring the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy. The number of Internet-connected smart devices is growing at a rapid pace. According to Gartner, the
More informationIBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationLOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
More informationA COMPLETE APPROACH TO SECURITY
A COMPLETE APPROACH TO SECURITY HOW TO ACHEIVE AGILE SECURITY OPERATIONS THREAT WATCH Cyber threats cost the UK economy 27 billion a year 200,000 new threats are identified every day 58% of businesses
More informationA Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations
A Vision for Operational Analytics as the Enabler for Focused Hybrid Cloud Operations As infrastructure and applications have evolved from legacy to modern technologies with the evolution of Hybrid Cloud
More informationRevitalising your Data Centre by Injecting Cloud Computing Attributes. Ricardo Lamas, Cloud Computing Consulting Architect IBM Australia
Revitalising your Data Centre by Injecting Attributes Ricardo Lamas, Consulting Architect IBM Australia Today s datacenters face enormous challenges: I need to consolidate to reduce sprawl and OPEX. I
More informationIBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
More informationData Center Infrastructure Management. optimize. your data center with our. DCIM weather station. Your business technologists.
Data Center Infrastructure Management optimize your data center with our DCIM weather station Your business technologists. Powering progress Are you feeling the heat of your data center operations? Data
More informationSecurity strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
More informationsecure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress
secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security
More informationIBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
More informationRAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
More informationCyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationSyslog Analyzer ABOUT US. Member of the TeleManagement Forum. info@ossera.com +1-916-290-9300 http://www.ossera.com
Syslog Analyzer ABOUT US OSSera, Inc. is a global provider of Operational Support System (OSS) solutions for IT organizations, service planning, service operations, and network operations. OSSera's multithreaded
More informationFederal Aviation Administration. efast. Cloud Computing Services. 25 October 2012. Federal Aviation Administration
efast Cloud Computing Services 25 October 2012 1 Bottom Line Up Front The FAA Cloud Computing Vision released in 2012 identified the agency's road map to meet the Cloud First Policy efast must provide
More informationWhat s New in Security Analytics 10.4. Be the Hunter.. Not the Hunted
What s New in Security Analytics 10.4 Be the Hunter.. Not the Hunted Attackers Are Outpacing Detection Attacker Capabilities Time To Discovery Source: VERIZON 2014 DATA BREACH INVESTIGATIONS REPORT 2 TRANSFORM
More informationSummary Report Report # 1. Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions
Summary Report Report # 1 Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions COINS Summer School 2015 on Could Security Prepared by: Nabeel Ali
More informationAssociate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
More informationASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
More informationCesario Di Sarno. Security Information and Event Management in Critical Infrastructures
Cesario Di Sarno Ph.D. Student in Information Engineering University of Naples «Parthenope» Security Information and Event Management in Critical Infrastructures Fai della Paganella 11 Febbraio 2014 Critical
More informationWorkshop on Collaborative Security and Privacy Technologies
Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin Trust and Society Trustworthy systems essential
More informationprepare for the unexpected stay in control in an age of evolving cyber threats Your business technologists. Powering progress
prepare for the unexpected stay in control in an age of evolving cyber threats Your business technologists. Powering progress Do more, risk less. Today and for the foreseeable future, your business is
More informationfreedom business unleashed enterprise cloud computing Your business technologists. Powering progress
freedom business unleashed enterprise cloud computing Your business technologists. Powering progress Experiment to evolution It s finally time to take cloud more seriously not as an experimental delivery
More informationNokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
More informationRSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA
RSA, The Security Division of EMC Zamanta Anguiano Sales Manager RSA The Age of the Hyperextended Enterprise BUSINESS ISSUES IMPACT Innovation Collaboration Exploding Information Supply Chain Customer
More informationIBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
More informationIBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
More informationObjective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering
Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate General Software & Service Architectures and Infrastructures
More informationMASSIF. D4.1.2 - Multi-level Abstraction Concept
MAnagement of Security information and events in Service InFrastructures MASSIF FP7-257475 Activity A4 Workpackage WP4.1 Due Date Month 24 Submission Date 2012-10-15 Main Author(s) Maria Zhdanova (Fraunhofer)
More informationThales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg
Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer
More informationReal-time distributed Complex Event Processing for Big Data scenarios
Institute of Parallel and Distributed Systems () Universitätsstraße 38 D-70569 Stuttgart Real-time distributed Complex Event Processing for Big Data scenarios Ruben Mayer Motivation: New Applications in
More informationThe Emergence of Security Business Intelligence: Risk
The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are
More informationTRAVERSE: HIGH AVAILABILITY CONFIGURATIONS
TRAVERSE: HIGH AVAILABILITY CONFIGURATIONS SUMMARY Zyrion s Traverse is a breakthrough service monitoring and network performance management software solution that provides real time visibility into the
More informationCLOUD BASED SEMANTIC EVENT PROCESSING FOR
CLOUD BASED SEMANTIC EVENT PROCESSING FOR MONITORING AND MANAGEMENT OF SUPPLY CHAINS A VLTN White Paper Dr. Bill Karakostas Bill.karakostas@vltn.be Executive Summary Supply chain visibility is essential
More informationFIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
More informationState of Security Monitoring of Public Cloud
State of Security Monitoring of Public Cloud Shittu O. Shittu Enterprise Security Architect, BP Enterprise Security Architect, trainline.com Director and Principal Consultant, TRAIS Mavens Ltd Highlights
More informationMetrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
More informationSecure and Effective IT Infrastructure
Secure and Effective IT Infrastructure Purpose of this document The IT infrastructure complexity is increasing in today s modern world. New products are constantly being released as well as new types of
More information