Click to edit Master title style

Size: px
Start display at page:

Download "Click to edit Master title style"

Transcription

1 Click to edit Master title style UNCLASSIFIED//FOR OFFICIAL USE ONLY Dr. Russell D. Richardson, G2/INSCOM Science Advisor UNCLASSIFIED//FOR OFFICIAL USE ONLY 1

2 UNCLASSIFIED Semantic Enrichment of the Data Entity Centric Precision Increasing Semantic Richness Solving the Precision / Recall Conundrum with Semantic Enrichment of the Data Concepts/Summarization (e.g. Terrorist Cell Leaders) Resolved Entity (John with ID xxxxx) Entity (Person, Object, Organization, Location) Semantically Labeled Data Po opulation Cen ntric Recall Increasing Anonymity Non- Attributable Aggressively Index Enabled by fine grain security and compliance enforcement De Anonymization of Large Data Sets Detect / Match Behaviors and Patterns Massive Data Sets for Anomaly / Change Detection Massive Data Aggregation for Machine Analytics, Baselining, and Trend Analysis Multi token/lemma/contexual Element/ Part of Speech (Noun, Pronoun, Punctuation) Token (Aggressively Indexed Words) Determine that Two Patterns of Life are the Same but Not Necessarily Whose Pattern of Life Indications and Warnings Non Attributable Aggregate Behavior Determine Avg Traffic Speed by Tracking Cell Movement Determine the Sentiment of a Town, City, Region, Country UNCLASSIFIED 2

3 Extending Cloud-Enabled Advanced Analytics UNCLASSIFIED All-Source Analytics for Big Data with Advances in Geospatial Indexing, Voice Index and Search, Biometric i Entity Management, Motion Imagery Tracks, Multi-INT Visualization, Collection Management, Support for Mobile Devices, Powerful Compute Platforms, Multi-Level Security, IC Shared Software,. Mobile Voice Motion Imagery Tracks

4 Click to edit Master title style Fusion Challenges Social Media All Source INTs Person Location Tipping and Cueing Pattern of Life Analysis Alerts & Notifications Information and Situation Sensors Information requests Tactical Reports HUMINT Biometrics DOMEX SIGINT GEOINT Cyber Org Unit ISR Optimization Persistent and Total Entity and Asset Tracking in Entity Database Threat Characterization COA Analysis Continuously & Always Correlating All Data into the Entity Database Challenges 1. Cross INT Correlation 2. Entity Resolution and Disambiguation 3. Scale of the Entity Database 4. Velocity of Data Collection and Processing 5. Dt Determining ii Ptt Patterns of Life and Major Combat Operations with Tolerance to Errors 6. Ranking Threat Severity and Timing 7. Optimizing / Synchronizing ISR 8. Real time Tipping and Cueing 4

5 Click to edit Need Master to Work title Entity style Tracking Threat Characterization Social Media Reports/ HUMINT Biometrics DOMEX SIGINT GEOINT Cyber Entity Database Person Location Org Unit 4 Optimize ISR ISR Form Links Precorrelat ted Linked Data base P1 P2 P3 P4 P5 L1 L2 L3 L4 O1 O2 O3 O4 O5 Persist Tracks 3 COAs (T2,L3) (T3,L3) (T4,L3) (T1,O1) (T3,L3) (T3,L2) (T1,L2) (T2,L2) (T3,L3) (T1,L1) (T2,L2) (T3,L3) (T1,P1) (T2,P1) (T1,P4) (T3,P3) (T1,P4) (T2,P5) (*,L1) (T1,P1) (T3,L3) 1 2 U1 U2 (T1,L1) (T1,L1) (T2,L1) (T2,L1) (T3,L3) (T3,L3) U3 U4 U5 T1 (P1,L1) (P3,L1) (T3,L3) T2 (P1,L1) (P2,L3) (T3,L3) T3 (P1,L3) (P3,L3) (T3,L3) T4 (P2,L3) (T2,L1) (T3,L3) T5 Same Time, Same Place L2 may be an important location as many P s have been reported being there Patterns of Life Determined P1 and P3 share location pattern Infer P3 at L1 as O1 is at L1 Location of P1 over time 5

6 The DCGS-A ICITE Cloud (aka Red Disk) Click to edit Master title style at-scale Entity Database Sensors Sources SIGINT MTI WAMI FMV TED Fires Harmony USMFT Collection Mgmt Open Source Mission Command Audio etc Velocity & Content EDH Provenance TDF Metadata tagging Geo temporal extraction Entity extraction and nomination Artifact enrichment Security Labeling Metrics more RTAAP NIFI / Storm Real Time Advanced Analytics Pipeline updating analytics earliest as possible. Data Interoperability Decreases Information Enterprise Context Burden Full Spectrum Analytic Awareness Artifacts, Terms Statements Analytics and indexes updated wrt to each artifact Maximally correlated data Contextual based navigation All data under a common representation to enable assess to all layers Cross corpus analytics without custom code Signatures are analyzed in real time Logical representation needs to be consistent in order for the physical model and view to be dynamic M/R MR Data Access Process User s authorizations and roles are matched to data security labels UCD Enrichment Analytics and indexes wrt to the entire corpus, Bulkand incremental updates Data sharing Analyst s conclusions enrich the UCD DIAS User s Authorizations Community Partners Classes of relationships determined at various points No all relationships need to be explicitly expressed correlations enable this All analytic disciplines together with correlated data among all disciplines Analytic models are represented in the UCD 6

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise 5 APR 2011 1 2005... Advanced Analytics Harnessing Data for the Warfighter I2E GIG Brigade Combat Team Data Silos DCGS LandWarNet

More information

This Conference brought to you by www.ttcus.com

This Conference brought to you by www.ttcus.com This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army

More information

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Army Intelligence Industry Day Foundation Layer Technology Focus Areas CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,

More information

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs

More information

Information and Understanding (IFU) Overview

Information and Understanding (IFU) Overview Information and Understanding (IFU) Overview Jun 8 th, 2010 Mark Pronobis IFU CTC Lead AFRL/RIEF mark.pronobis@rl.af.mil Approved for Public Release; Distribution Unlimited: 88ABW-2010-2619 dated 13 May

More information

How To Create A Data Science System

How To Create A Data Science System Enhance Collaboration and Data Sharing for Faster Decisions and Improved Mission Outcome Richard Breakiron Senior Director, Cyber Solutions Rbreakiron@vion.com Office: 571-353-6127 / Cell: 803-443-8002

More information

How To Build A Cloud Based Intelligence System

How To Build A Cloud Based Intelligence System Semantic Technology and Cloud Computing Applied to Tactical Intelligence Domain Steve Hamby Chief Technology Officer Orbis Technologies, Inc. shamby@orbistechnologies.com 678.346.6386 1 Abstract The tactical

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

Providing On-Demand Situational Awareness

Providing On-Demand Situational Awareness ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

Machine Data Analytics with Sumo Logic

Machine Data Analytics with Sumo Logic Machine Data Analytics with Sumo Logic A Sumo Logic White Paper Introduction Today, organizations generate more data in ten minutes than they did during the entire year in 2003. This exponential growth

More information

Sustainable Development with Geospatial Information Leveraging the Data and Technology Revolution

Sustainable Development with Geospatial Information Leveraging the Data and Technology Revolution Sustainable Development with Geospatial Information Leveraging the Data and Technology Revolution Steven Hagan, Vice President, Server Technologies 1 Copyright 2011, Oracle and/or its affiliates. All rights

More information

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Cognitive and Organizational Challenges of Big Data in Cyber Defense Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational

More information

Big Data & Security. Aljosa Pasic 12/02/2015

Big Data & Security. Aljosa Pasic 12/02/2015 Big Data & Security Aljosa Pasic 12/02/2015 Welcome to Madrid!!! Big Data AND security: what is there on our minds? Big Data tools and technologies Big Data T&T chain and security/privacy concern mappings

More information

White Paper. How Streaming Data Analytics Enables Real-Time Decisions

White Paper. How Streaming Data Analytics Enables Real-Time Decisions White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream

More information

Applied Research Laboratory: Visualization, Information and Imaging Programs

Applied Research Laboratory: Visualization, Information and Imaging Programs Applied Research Laboratory: Visualization, Information and Imaging Programs Dr. Christopher Griffin Applied Research Laboratory Penn State University Applied Research Laboratory - DoD Designated UARC

More information

How Using Big Data in Security Helps (and Hurts) Us

How Using Big Data in Security Helps (and Hurts) Us How Using Big Data in Security Helps (and Hurts) Us Kerry Matre, CIPP/US What is your role? 2 $300 Billion 3 What do insiders look like? 4 Basic insider threat monitoring Block IPs Signature based monitors

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

HOW TO DO A SMART DATA PROJECT

HOW TO DO A SMART DATA PROJECT April 2014 Smart Data Strategies HOW TO DO A SMART DATA PROJECT Guideline www.altiliagroup.com Summary ALTILIA s approach to Smart Data PROJECTS 3 1. BUSINESS USE CASE DEFINITION 4 2. PROJECT PLANNING

More information

Big Data for Government Symposium

Big Data for Government Symposium @TECHTrain Big Data for Government Symposium http://www.ttcus.com Linkedin/Groups: Technology Training Corporation DHS BIG DATA CAPABILITIES WHAT TO USE Focus is on meeting Mission Decision Needs Gathering

More information

Semantic Chat for Command, Control, and Intel Beyond Text

Semantic Chat for Command, Control, and Intel Beyond Text - 1 - Semantic for Command, Control, and Intel Beyond Text Version 1.0 draft, 2/23/2005 Authors Michael Behrens, R2AD, LLC Abstract tools have been around for a long time and have recently been recognized

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Patterns of Information Management

Patterns of Information Management PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy

More information

New Technology Capabilities

New Technology Capabilities New Technology Capabilities Software/Applications 1. Biometric ID capability 2. Standardized secure, connectivity, and storage of data (bio, roles, etc) 3. Rules- based expert engine a. Automated dispatch

More information

A Primer on Cyber Threat Intelligence

A Primer on Cyber Threat Intelligence A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Security as Architecture A fine grained multi-tiered containment strategy

Security as Architecture A fine grained multi-tiered containment strategy 1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG aszakal@us.ibm.com 2 Objectives Cybersecurity

More information

Are You Ready for Big Data?

Are You Ready for Big Data? Are You Ready for Big Data? Jim Gallo National Director, Business Analytics April 10, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?

More information

Are You Ready for Big Data?

Are You Ready for Big Data? Are You Ready for Big Data? Jim Gallo National Director, Business Analytics February 11, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?

More information

Threat Intelligence: Friend of the Enterprise

Threat Intelligence: Friend of the Enterprise SECURELY ENABLING BUSINESS Threat Intelligence: Friend of the Enterprise Danny Pickens Principal Intelligence Analyst MSS FishNet Security DANNY PICKENS Principal Intelligence Analyst, FishNet Security

More information

Smarter Planet evolution

Smarter Planet evolution Smarter Planet evolution 13/03/2012 2012 IBM Corporation Ignacio Pérez González Enterprise Architect ignacio.perez@es.ibm.com @ignaciopr Mike May Technologies of the Change Capabilities Tendencies Vision

More information

With DDN Big Data Storage

With DDN Big Data Storage DDN Solution Brief Accelerate > ISR With DDN Big Data Storage The Way to Capture and Analyze the Growing Amount of Data Created by New Technologies 2012 DataDirect Networks. All Rights Reserved. The Big

More information

可 视 化 与 可 视 计 算 概 论. Introduction to Visualization and Visual Computing 袁 晓 如 北 京 大 学 2015.12.23

可 视 化 与 可 视 计 算 概 论. Introduction to Visualization and Visual Computing 袁 晓 如 北 京 大 学 2015.12.23 可 视 化 与 可 视 计 算 概 论 Introduction to Visualization and Visual Computing 袁 晓 如 北 京 大 学 2015.12.23 2 Visual Analytics Adapted from Jim Thomas s slides 3 Visual Analytics Definition Visual Analytics is the

More information

Autonomy Consolidated Archive

Autonomy Consolidated Archive Autonomy Consolidated Archive Dennis Wild Director SME, Information Governance and Archiving POWER PROTECT PROMOTE Meaning-Based Governance Files IM Audio Email Social Video SharePoint Archiving = Gain

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Enterprise Capabilities Descriptions

Enterprise Capabilities Descriptions 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC

More information

Cyber Watch. Written by Peter Buxbaum

Cyber Watch. Written by Peter Buxbaum Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

Open Platform. Clinical Portal. Provider Mobile. Orion Health. Rhapsody Integration Engine. RAD LAB PAYER Rx

Open Platform. Clinical Portal. Provider Mobile. Orion Health. Rhapsody Integration Engine. RAD LAB PAYER Rx Open Platform Provider Mobile Clinical Portal Engage Portal Allegro PRIVACY EMR Connect Amadeus Big Data Engine Data Processing Pipeline PAYER CLINICAL CONSUMER CUSTOM Open APIs EMPI TERMINOLOGY SERVICES

More information

Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation)

Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation) July, 2013 Portland Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation) Jacques Durand (Fujitsu) Matt Rutkowski (IBM) Disclaimer The information in this presentation represents

More information

Leveraging Big Data Technologies to Support Research in Unstructured Data Analytics

Leveraging Big Data Technologies to Support Research in Unstructured Data Analytics Leveraging Big Data Technologies to Support Research in Unstructured Data Analytics BY FRANÇOYS LABONTÉ GENERAL MANAGER JUNE 16, 2015 Principal partenaire financier WWW.CRIM.CA ABOUT CRIM Applied research

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Imagine a global data collection network that gathered information on. everyone doing anything

Imagine a global data collection network that gathered information on. everyone doing anything Imagine a global data collection network that gathered information on everyone doing anything Fusion Centers or I Spy for the Intelligence Enterprise Copyright OK-SAFE, Inc. August 2010 Freedom Action

More information

Active Response: Automated Risk Reduction or Manual Action?

Active Response: Automated Risk Reduction or Manual Action? SESSION ID: CRWD-01 Active Response: Automated Risk Reduction or Manual Action? sec ops dream Monzy Merza Chief Security Evangelist Splunk @monzymerza Agenda Active Response Drivers Facets of Active Response

More information

Navy Information Dominance Industry Day

Navy Information Dominance Industry Day Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

V ID E O A N A LYT ICS

V ID E O A N A LYT ICS O SI A N D T HE P OWE R V ID E O A N A LYT ICS C A PA B I L IT IE S O F SOLUTION BRIEF OSI and Video Analytics Technical Capabilities Founded in 1996, Organizational Strategies, Inc. (OSI) offers a portfolio

More information

The Big Data Paradigm Shift. Insight Through Automation

The Big Data Paradigm Shift. Insight Through Automation The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.

More information

Workforce Management: Introducing a Policy Rules Engine to Industrial Security Adrian Fielding, Honeywell Damian Vassallo, RightCrowd

Workforce Management: Introducing a Policy Rules Engine to Industrial Security Adrian Fielding, Honeywell Damian Vassallo, RightCrowd 2015 Honeywell Users Group Europe, Middle East and Africa Workforce Management: Introducing a Policy Rules Engine to Industrial Security Adrian Fielding, Honeywell Damian Vassallo, RightCrowd Integrated

More information

BUSINESS VALUE OF SEMANTIC TECHNOLOGY

BUSINESS VALUE OF SEMANTIC TECHNOLOGY BUSINESS VALUE OF SEMANTIC TECHNOLOGY Preliminary Findings Industry Advisory Council Emerging Technology (ET) SIG Information Sharing & Collaboration Committee July 15, 2005 Mills Davis Managing Director

More information

Case Management and Real-time Data Analysis

Case Management and Real-time Data Analysis SOLUTION SET AcuityPlus Case Management and Real-time Data Analysis Introduction AcuityPlus enhances the Quality Assurance and Management capabilities of the Cistera Convergence Server by taking existing

More information

Intelligent Business Operations and Big Data. 2014 Software AG. All rights reserved.

Intelligent Business Operations and Big Data. 2014 Software AG. All rights reserved. Intelligent Business Operations and Big Data 1 What is Big Data? Big data is a popular term used to acknowledge the exponential growth, availability and use of information in the data-rich landscape of

More information

Applications of Deep Learning to the GEOINT mission. June 2015

Applications of Deep Learning to the GEOINT mission. June 2015 Applications of Deep Learning to the GEOINT mission June 2015 Overview Motivation Deep Learning Recap GEOINT applications: Imagery exploitation OSINT exploitation Geospatial and activity based analytics

More information

Can We Become Resilient to Cyber Attacks?

Can We Become Resilient to Cyber Attacks? Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,

More information

NEEDLE STACKS & BIG DATA: USING EVENT STREAM PROCESSING FOR RISK, SURVEILLANCE & SECURITY ANALYTICS IN CAPITAL MARKETS

NEEDLE STACKS & BIG DATA: USING EVENT STREAM PROCESSING FOR RISK, SURVEILLANCE & SECURITY ANALYTICS IN CAPITAL MARKETS NEEDLE STACKS & BIG DATA: USING PROCESSING FOR RISK, SURVEILLANCE & SECURITY ANALYTICS IN CAPITAL MARKETS JERRY BAULIER, DIRECTOR, PROCESSING DAVID M. WALLACE, GLOBAL FINANCIAL SERVICES MARKETING MANAGER

More information

1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS 1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS $32.8B 100,000 Cyber Criminals State-Sponsored Spies Hactivists We live in a POST-PREVENTION Amount enterprises are

More information

5 Keys to Unlocking the Big Data Analytics Puzzle. Anurag Tandon Director, Product Marketing March 26, 2014

5 Keys to Unlocking the Big Data Analytics Puzzle. Anurag Tandon Director, Product Marketing March 26, 2014 5 Keys to Unlocking the Big Data Analytics Puzzle Anurag Tandon Director, Product Marketing March 26, 2014 1 A Little About Us A global footprint. A proven innovator. A leader in enterprise analytics for

More information

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS Samir Saklikar RSA, The Security Division of EMC Session ID: CLE T05 Session Classification: Intermediate Agenda Advanced Targeted

More information

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy Much higher Volumes. Processed with more Velocity. With much more Variety. Is Big Data so big? Big Data Smart Data Project HAVEn: Adaptive Intelligence

More information

Our Data & Methodology. Understanding the Digital World by Turning Data into Insights

Our Data & Methodology. Understanding the Digital World by Turning Data into Insights Our Data & Methodology Understanding the Digital World by Turning Data into Insights Understanding Today s Digital World SimilarWeb provides data and insights to help businesses make better decisions,

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum

Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum Siva Ravada Senior Director of Development Oracle Spatial and MapViewer 2 Evolving Technology Platforms

More information

4 Steps to Surviving Big Data

4 Steps to Surviving Big Data 4 Steps to Surviving Big Data As big data projects slam network performance, network managers must be ready for the challenges they bring. There s No Doubt that Big Data is a Big Deal to Companies Today

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

Network Security Deployment (NSD)

Network Security Deployment (NSD) Network Security Deployment (NSD) National Cybersecurity Protection System (NCPS) 11 July 2012 What is the NCPS? National Cybersecurity Protection System (NCPS) is the program of record within the Department

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

YOU VS THE SENSORS. Six Requirements for Visualizing the Internet of Things. Dan Potter Chief Marketing Officer, Datawatch Corporation

YOU VS THE SENSORS. Six Requirements for Visualizing the Internet of Things. Dan Potter Chief Marketing Officer, Datawatch Corporation YOU VS THE SENSORS Six Requirements for Visualizing the Internet of Things Dan Potter Chief Marketing Officer, Datawatch Corporation About Datawatch NASDAQ: DWCH Pioneer in real-time visual data discovery

More information

North Highland Data and Analytics. Data Governance Considerations for Big Data Analytics

North Highland Data and Analytics. Data Governance Considerations for Big Data Analytics North Highland and Analytics Governance Considerations for Big Analytics Agenda Traditional BI/Analytics vs. Big Analytics Types of Requiring Governance Key Considerations Information Framework Organizational

More information

Empowering Analysts With Big Data

Empowering Analysts With Big Data White Paper: Empowering Analysts With Big Data Inside: Balancing your approach to Big Data Criteria for evaluating your enterprise approach Tips for getting started 1 Four Years of Research Into Big Data

More information

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation

More information

Improvised Explosive Device Network Analysis

Improvised Explosive Device Network Analysis Improvised Explosive Device Network Analysis IED NA utilizes network analysis methods to fill gaps in the understanding and visualization of IED networks Typical network analysis of illicit networks focuses

More information

The Lab and The Factory

The Lab and The Factory The Lab and The Factory Architecting for Big Data Management April Reeve DAMA Wisconsin March 11 2014 1 A good speech should be like a woman's skirt: long enough to cover the subject and short enough to

More information

Security strategies to stay off the Børsen front page

Security strategies to stay off the Børsen front page Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the

More information

The following was presented at DMT 14 (June 1-4, 2014, Newark, DE).

The following was presented at DMT 14 (June 1-4, 2014, Newark, DE). DMT 2014 The following was presented at DMT 14 (June 1-4, 2014, Newark, DE). The contents are provisional and will be superseded by a paper in the DMT 14 Proceedings. See also presentations and Proceedings

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

A Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations

A Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations A Vision for Operational Analytics as the Enabler for Focused Hybrid Cloud Operations As infrastructure and applications have evolved from legacy to modern technologies with the evolution of Hybrid Cloud

More information

This Conference brought to you by www.ttcus.com

This Conference brought to you by www.ttcus.com This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com //FOUO ARSTAF Day at the Pre Command Course Army

More information

Data Driven Assessment of Cyber Risk:

Data Driven Assessment of Cyber Risk: Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech InformationSecurity Center Georgia Tech Research Institute

More information

Government Technology Trends to Watch in 2014: Big Data

Government Technology Trends to Watch in 2014: Big Data Government Technology Trends to Watch in 2014: Big Data OVERVIEW The federal government manages a wide variety of civilian, defense and intelligence programs and services, which both produce and require

More information

THE ENTERPRISE GAMING COOKBOOK

THE ENTERPRISE GAMING COOKBOOK THE ENTERPRISE GAMING COOKBOOK Learn how game studios in our Ecosystem are using Bluemix to build the world s most advanced serious games We break down the web services needed to develop a variety of experiences

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Increase Agility and Reduce Costs with a Logical Data Warehouse. February 2014

Increase Agility and Reduce Costs with a Logical Data Warehouse. February 2014 Increase Agility and Reduce Costs with a Logical Data Warehouse February 2014 Table of Contents Summary... 3 Data Virtualization & the Logical Data Warehouse... 4 What is a Logical Data Warehouse?... 4

More information

Big Data and Analytics: Getting Started with ArcGIS. Mike Park Erik Hoel

Big Data and Analytics: Getting Started with ArcGIS. Mike Park Erik Hoel Big Data and Analytics: Getting Started with ArcGIS Mike Park Erik Hoel Agenda Overview of big data Distributed computation User experience Data management Big data What is it? Big Data is a loosely defined

More information

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR 場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance

More information

The Next Gen ISR Conference brought to you by: www.ttcus.com

The Next Gen ISR Conference brought to you by: www.ttcus.com The Next Gen ISR Conference brought to you by: www.ttcus.com @Techtrain Linkedin/Groups: Technology Training Corporation BOOZ ALLEN HAMILTON DCGS Enhanced ISR: PED for Actionable Intelligence WAZE is an

More information

Solving big data problems in real-time with CEP and Dashboards - patterns and tips

Solving big data problems in real-time with CEP and Dashboards - patterns and tips September 10-13, 2012 Orlando, Florida Solving big data problems in real-time with CEP and Dashboards - patterns and tips Kevin Wilson Karl Kwong Learning Points Big data is a reality and organizations

More information

Framing the Issue What are Usability and UCD? What do they have to do with Security? Current State of Usability in EHRs Role and Activities of NIST

Framing the Issue What are Usability and UCD? What do they have to do with Security? Current State of Usability in EHRs Role and Activities of NIST Framing the Issue What are Usability and UCD? What do they have to do with Security? Current State of Usability in EHRs Role and Activities of NIST in Usability So What Can We Do? Is it because system

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

Leveraging Network Infrastructure to Bring Critical Information to Users

Leveraging Network Infrastructure to Bring Critical Information to Users Leveraging Network Infrastructure to Bring Critical Information to Users 13 May 2013 Brian Slaughter Director, Global Public Safety Sales General Dynamics C4 Systems 2013 General Dynamics. All rights reserved.

More information

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In

More information

Security and privacy for multimedia database management systems

Security and privacy for multimedia database management systems Multimed Tools Appl (2007) 33:13 29 DOI 10.1007/s11042-006-0096-1 Security and privacy for multimedia database management systems Bhavani Thuraisingham Published online: 1 March 2007 # Springer Science

More information

Solutions to Trust. NEXThink V5 What is New?

Solutions to Trust. NEXThink V5 What is New? Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product

More information

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Emerging Geospatial Trends The Convergence of Technologies. Jim Steiner Vice President, Product Management

Emerging Geospatial Trends The Convergence of Technologies. Jim Steiner Vice President, Product Management Emerging Geospatial Trends The Convergence of Technologies Jim Steiner Vice President, Product Management United Nation Analysis Initiative on Global GeoSpatial Information Management Future Trends Technology

More information

ORACLE MANUFACTURING EXECUTION SYSTEM FOR DISCRETE MANUFACTURING

ORACLE MANUFACTURING EXECUTION SYSTEM FOR DISCRETE MANUFACTURING ORACLE MANUFACTURING EXECUTION SYSTEM FOR DISCRETE MANUFACTURING KEY FEATURES The Manufacturing Execution System for Discrete Manufacturing is comprised of the MES Workstation for Operators and the MES

More information

Flattening Enterprise Knowledge

Flattening Enterprise Knowledge Flattening Enterprise Knowledge Do you Control Your Content or Does Your Content Control You? 1 Executive Summary: Enterprise Content Management (ECM) is a common buzz term and every IT manager knows it

More information

GXP WebView GEOSPATIAL EXPLOITATION PRODUCTS (GXP )

GXP WebView GEOSPATIAL EXPLOITATION PRODUCTS (GXP ) GEOSPATIAL EXPLOITATION PRODUCTS (GXP ) GXP WebView A Web-based, full-resolution image viewing tool for visualization, annotation, measurement, and publishing providing access to remote data from any location.

More information