From Big Data to Rich Data How Data Analytics Add Value to Security Risk Management. Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016
|
|
|
- Madeline Flowers
- 9 years ago
- Views:
Transcription
1 How Data Analytics Add Value to Security Risk Management Patrick Hennies, Rainer Rex 15th European ASIS, 04/08/2016
2 Who we are Global leading positions in consumer and industrial businesses Consumer Businesses Industrial Business Laundry & Home Care Beauty Care Adhesive Technologies 2
3 Who we are Henkel at a glance ,000 employees worldwide Active in more than 190 countries Around 18.1 bn sales, +3.0% organic sales growth 61% of our sales generated by our top 10 brands 472 locations around the world 139 years of brand success 3
4 Global Security Organization Corporate Security Fire Safety Operational Security Regional Security 4
5 Corporate Governance Segregation of Duties Headquarter Specialized Experts providing guidelines and ensuring holistic security Regions Regional Experts providing local knowledge following the framework provided by the Headquarter 5
6 Security Threats at Henkel Diverse landscape North America Regional Head of Security Corporate Security Head of Corporate Security Office Global Security Corporate Director Global Security Europe Regional Head of Security Commonwealth of Independent States Regional Head of Security Russia Area Security Manager Ukraine Area Security Manager Mexico Area Security Manager Latin America Regional Head of Security India / Middle East / Africa Regional Head of Security Greater China Area Security Manager Threat Rating Insignificant Low Colombia / Andean Area Security Manager India Area Security Manager Asia / Pacific Regional Head of Security Security Analyst China Medium High Brazil / Mercosur Area Security Manager Extreme Approx. ~200 employees, 15 nationalities in 12 locations 6
7 Global Trends Challenges for Security Management Failure of Infrastructure Social Instability Global Threats World Without Secrets Terrorism & Extremism Natural Disasters 7
8 The Challenge Separate significant from irrelevant alerts Storm Kidnapping Power outages Protests Explosions Traffic accident Tsunami Flight cancellations Crime Flooding Demonstrations 8 Strikes Earthquake Shootings Flight disruptions Blackouts Terrorist Attacks Plane Crash Bombing Pandemic Daily confrontation with a flood of alerts
9 The Response Intelligent Data Analyses Increasing number of Alerts BIG DATA 8000 Enormous data Short lifetime of information Reliability of Facts estimated Informational Warning & Critical Fast and reliable decision making is essential 9
10 The Benefits How data analytics support management communication 10
11 Big Data vs. Rich Data Monitoring and analyzing real-time data Big Data Rich Data Impressive volume, Limited value Precise and subject to rigorous quality control 11
12 Changing Security 2020 Move from reactive to proactive VOLUME Data Size VELOCITY Speed of Change VARIETY Different forms of data sources VERACITY Uncertainty of Data Develop a methodology to gain control of information! 12
13 Threat Inventory What needs to be monitored? Crime Health threats Sabotaget Extortion Embezzlementt Burglaryt Kidnappingt Natural disaster Theftt Fraud Stalking Geopolitical t threats Workplace violencet Vandalismt Assaultt Infrastructure collapse Information loss 13
14 Big Data Transformation to Rich Data Threats Data sources Intelligence services News & web monitoring Security service provider External network information Internal incident reporting Strategic concept Information aggregation Operational knowledge Security Risk Assessment 14
15 Corporate Security Define threats for each work stream Threats by activists and social unrest Natural disaster threats Crimet Infrastructure collapse Information loss and espionage threats 15
16 Implementation example: Physical Security Matching asset risk ratings and mitigation measures Pool of relevant threats Data Sources Relevant threats per work stream Algorithm Defined assets per work stream Individual asset risk ratings Pre-defined measures tailored to asset risk 16
17 Threat Management An effective framework Policies Roles Measures Auditability 17
18 Visualization What we have today Conventional risk maps Self-made charts Theft Property offenses Assault Workplace violence Vadalism Corruption 18
19 Visualization What we are looking for 19
20 Example of missing data Emergency Travel Assistance 20
21 Example of missing data Alert and trend analytics Likes, Comments and Shares Alert Feedback Source: Likes Comments Shares Incoming Alert not relevant to be monitored highly relevant Please select relevancy for your organization! Source: Source: Source: 21
22 Benefits of Rich Data What is it all about? Value-added calculation Fact based threat levels Continuous benchmarking Measures Risk adjusted prevention Enhanced forecast 22
23 Why are we here? No rich data without data exchange! 23
Kick Starting your Business Continuity Program
425.670.8700 www.continuityleadership.com Kick Starting your Business Continuity Program Phil Lambert President [email protected] The Center for Continuity Leadership Phil 20 years in field
Prepared by Rod Davis, ABCP, MCSA November, 2011
Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,
Security Risk Assessment Tool
Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Microsoft Global Security Operations Centers
Microsoft Global Security Operations Centers Customer Profile Microsoft's global security operations centers (GSOCs) monitor the safety and security of the company's facilities and operations around the
Beyond Effective Security. The Art and Science of Business Continuity Planning
Beyond Effective Security The Art and Science of Business Continuity Planning Fred Young, CIPM, CRM Executive Director Risk Management RE/MAX International Holdings, Inc The Wildlife Experience Business
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
- SAMPLE CUSTOMIZED REPORT - Business Continuity Program Benchmark Report
- SAMPLE CUSTOMIZED REPORT - Business Continuity Program Benchmark Report Customized & Prepared Exclusively for XXX Company July 16, 2009 Benchmarking. Plan Ahead. Be Ahead. HAVE YOU EVER NEEDED DATA TO
CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE
1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million
Travel Risk Management
ijet/wp-0001/07 Travel Risk Management A Comprehensive Program to Protect and Support Your Travelers AUGUST 2006 Additional copies of this report are available at www.travelriskcenter.com. Please note
Organizational Security Track FAQ
Organizational Security Track FAQ What do organizational security management professionals do? Organizational security management professionals are employed by organizations (corporations, partnerships,
BUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility
Management in an Uncertain. David A.J. Axson
Globalizing Performance Management in an Uncertain World David A.J. Axson Its been a crazy few years Global Financial Crisis US Debt Eurozone meltdown Volcanic ash Oil prices Terrorism Commodity prices
DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning
Your Documents. Our Management. DASTA Guide to Business Continuity (BC) and Disaster Recovery (DR) Planning Dr. Robert L. Bailey, CRM, MIT, ECMp L E A R N M O R E A B O U T D A S T A A T W W W. D R M.
NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security
3 Risk assessment tool BEFORE DEPLOYMENT OR STARTING PROGRAMME Context analysis and actor mapping Risk assessment Security strategies Acceptance, protection and deterrence What is the context and who are
Fraud Management Solutions. Decision Manager Detect more fraud accurately and faster with the world s largest fraud detection radar
Fraud Management Solutions Decision Manager Detect more fraud accurately and faster with the world s largest fraud detection radar 02 Fraud Management Solutions CyberSource Decision Manager: The World
RUAG Cyber Security. More security for your data
RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making
An Economist s View of Global Trade Flows
Dr. Rebecca Harding CEO [email protected] Dr. Rebecca Harding CEO rh@equant- analytics.com An Economist s View of Global Trade Flows TXF, Trade and Treasury, Frankfurt, 12-13 November 2015 Trade
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Global Security Program Overview
STATE STREET GLOBAL SECURITY Global Security Program Overview ASIS International Kansas City Chapter March 5, 2015 Stephen D Baker CPP Vice President & Deputy Chief Security Officer About State Street
Temple university. Auditing a business continuity management BCM. November, 2015
Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program
Threats and Hazards: Event Challenges and Impacts. Event Disruptions Are Always A Possibility Planning Is the Key to Surviving Them
Threats and Hazards: Event Challenges and Impacts Event Disruptions Are Always A Possibility Planning Is the Key to Surviving Them In the past several years, Americans have experienced unthinkable disasters
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Using Big Data for Crisis Management. Mohammad Khaled AL Hassan
Using Big Data for Crisis Management Mohammad Khaled AL Hassan Agenda 1 2 3 4 Introduction Purpose of Big Data for Crises Management Crisiss Description Mission & Vision Crises Management & Business Need
I. World trade developments
I. World trade developments World merchandise exports stagnated in value terms in 2012 while exports of commercial services increased by 2 per cent. Key developments in 2012: a snapshot Trade data List
DHL CARGO INSURANCE RELAX. YOU RE IN SAFE HANDS
DHL CARGO INSURANCE RELAX. YOU RE IN SAFE HANDS ARE YOU FULLY COVERED? Freight forwarders and carriers have limited liability under international conventions for the loss or damage to goods. In the case
KIDNAP, RANSOM & EXTORTION
KIDNAP, RANSOM & EXTORTION I N S U R A N C E * W O R L D W I D E C O V E R A G E PROTECT yourself & your family against the unexpected. Company Profile We are an independent insurance broker with over
Operational Risk Management Policy
Operational Risk Management Policy Operational Risk Definition A bank, including a development bank, is influenced by the developments of the external environment in which it is called to operate, as well
of Insight, Access Influence
Tapping into a Global Channel & GETTING ENGAGED WITH GLOBAL MARKETING LEADERS of Insight, Access Influence Mission & Mandate Powerful channel of insight, access and influence Trusted community with shared
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
ACE BUSINESS TRAVEL INSURANCE
ACCIDENT & HEALTH ACE BUSINESS TRAVEL INSURANCE LOCAL EXPERTS, GLOBAL COVER Why choose ACE? A new and improved policy with broad coverage and a host of additional benefits Expert service from local underwriting
Diligence Management Consultants Company profile. Middle East - Africa - South Asia
Diligence Management Consultants Company profile Middle East - Africa - South Asia Chapter 1 Who we are Established in 2008 in the United Arab Emirates, Diligence has emerged as the primary security and
Business Continuity Management
Business Continuity Management Continuity Management is January 2004 Willis Business Continuity Management September 2002 1 Continuity Management is It is about managing the risks that threaten the survival
Business Continuity Planning Guide
Business Continuity Planning Guide For Small Businesses Prepared by the City of Vaughan Emergency Planning Department 1 Business Continuity Planning Business Continuity Planning (BCP) is a planning process
The Asian Event Dedicated to Homeland and Civil Security
The Asian Event Dedicated to Homeland and Civil Security In a market with strong needs in security matters, Asia Pacific Homeland Security responds to the expectations of governments, urban local administrations,
Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services
NYA International B Effective risk management begins with a comprehensive understanding of the threat and an organisation s vulnerability, and the application of appropriate mitigation measures. Operating
Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains
Supply Chain Risk: Understanding Emerging Threats to Global Supply Chains Prof John Manners-Bell, Logistics and Supply Chain Council, WEF CEO, Transport Intelligence Sao Paulo, March 2015 Changes in SCM
Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN
Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN I. INTRODUCTION A. PURPOSE - The University of Hawaii System Emergency Operations Plan (EOP) provides procedures for managing
Emergency Preparedness Tips and Actions for the Workplace
Emergency Preparedness Tips and Actions for the Workplace Is Your Business Disaster Ready? Disaster and emergencies can happen anytime and anywhere in Minnesota. 52 Presidential Disaster Declarations between
Operational Risk Management (ORM) and Business Continuity Plans (BCP)
The World Bank Operational Risk Management (ORM) and Business Continuity Plans (BCP) Ian Storkey, Consultant ORM & BCP Why Necessary? ORM Govt Cases Anglo Leasing Affair in Kenya (2004) Orange County (1994)
Travel Emergency, Risk Mitigation, and Duty of Care Considerations and Tools for Today s Challenging World
Travel Emergency, Risk Mitigation, and Duty of Care Considerations and Tools for Today s Challenging World Savings. Solutions. Systems. Presenters: Mike MacNair, President & CEO of MacNair Travel Management
Cybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
ASSET Connect. The next level in Critical Environment Operational Efficiency
Connect The next level in Critical Environment Operational Efficiency 10-30% is the potential efficiency gain from optimized Data Centers and Critical Environments Operational Efficiency of Your Critical
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
Integral Ad Science Semiannual Review
2012 Integral Ad Science Semiannual Review Key findings from Integral s analysis of the display advertising industry and 2012 Industry Analysis and Key Findings Understanding and analyzing the risk of
Business Continuity Management Systems. Protecting for tomorrow by building resilience today
Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Managing Travel Security Risks. Keeping your business travellers safe
Managing Travel Security Risks Keeping your business travellers safe NBTA- Monday 27 th May 2013, OSLO Andy Gibson Ricus GROENEWALD Director, Offshore & Maritime Director of Assistance International SOS
Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors
Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors May 2013 Contents Section Slide Numbers Executive Summary 4 Market
Saxo Portfolio Manager. Integrated Portfolio Management, Trading and Reporting
Saxo Portfolio Manager Integrated Portfolio Management, Trading and Reporting Saxo Portfolio Manager An integrated portfolio management and trading solution for wealth managers Saxo Portfolio Manager
SECURITY MANAGEMENT PRACTICES
FAULKNER SECURITY MANAGEMENT PRACTICES Insightful, real-world reports for meeting today s complex security and business continuity challenges FREE PREVIEW AVAILABLE See inside for details guest authors
Investor Presentation
Investor Presentation Safe Harbor Forward looking statements This presentation contains forward-looking statements that are based on our beliefs and assumptions and on information currently available to
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared?
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125 When Disaster Strikes Are You Prepared? Copyright Materials This presentation is protected by US and International Copyright laws.
FirstToSee: Leveraging Social Media for Emergency Response. June 21, 2013
FirstToSee: Leveraging Social Media for Emergency Response June 21, 2013 1 Overview Social media now plays a critical role in how the public communicates during an emergency. The FirstToSee Emergency Support
Homeland Security for Schools: Threat Status Alert Worksheet
for Schools: Threat Status Alert Worksheet The Green Alert Status reflects a low risk of terrorist attacks. The primary goal of a safe school plan is to safeguard schools against crime, violence and disruption.
7 th CAPSCA Asia Pacific Meeting. Mr Desmond Chong, Manager, Airport Operations Centre
7 th CAPSCA Asia Pacific Meeting Business Continuity Management Systems: Implementation Guidelines for Airports Colombo Sri Lanka 20-23 May 2014 Mr Desmond Chong, Manager, Airport Operations Centre Changi
Building Value from Visibility
A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies Building Value from Visibility 2012 Enterprise Internet of Things Adoption Outlook October 2012 Table Of Contents Executive
The Mobile Effect: Disrupting the Competitive Landscape in the Digital Travel Market
Phocuswright White Paper The Mobile Effect: Disrupting the Competitive Landscape in the Digital Travel Market Sponsored by Written by Cathy Schetzina Walsh Researched by Marcello Gasdia This Phocuswright
our enterprise security Empowering business
our enterprise security Empowering business Introduction Communication is changing the way we live and work. Ericsson plays a key role in this evolution, using innovation to empower people, business and
WHITE PAPER WHY ENTERPRISE RESOURCE PLANNING SOFTWARE IS YOUR BEST BUSINESS INTELLIGENCE TOOL
WHITE PAPER WHY ENTERPRISE RESOURCE PLANNING SOFTWARE IS YOUR BEST BUSINESS INTELLIGENCE TOOL CONTENT WHY COMPANIES WANT BUSINESS INTELLIGENCE... 1 BUILT-IN MEANS BETTER ACCESSIBILITY... 2 CONCLUSION...
PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH
WWW.WIPRO.COM PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH Floya Muhury Ghosh Table of contents 01 Abstract 01 Industry Landscape 02 Current OM Tools Limitations 02 Current OM Tools Potential Improvements
How To Protect Your It Infrastructure
Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding
The structure and organization of the Fusion Center takes its direction from four key documents, they are:
The structure and organization of the Fusion Center takes its direction from four key documents, they are: Northern Operational Office MISSION We incorporate information and utilize relationships formed
Investing in the Currency of the Future: Big Data for the Manufacturing Domain
Investing in the Currency of the Future: Big Data for the Manufacturing Domain Transition Towards Data-driven Real-time Visibility and Decision Making Compels Manufacturers to Adopt Big Data Solutions
Physical Security Services
Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
BT Conferencing Business Continuity Management. Planning to stay in business
BT Conferencing Business Continuity Management Planning to stay in business Planning for the unexpected In today s connected world, businesses are increasingly dependent on their communications and networked
Making Leaders Successful Every Day
Making Leaders Successful Every Day Succeeding In Global ecommerce Forrester Research Benjamin Ensor Research Director, ebusiness & Channel Strategy March 13, 2013 For internal use only Agenda What s the
Table of Contents... 1
... 1 Chapter 1 Introduction... 4 1.1 Executive Summary... 4 1.2 Goals and Objectives... 5 1.3 Senior Management and Board of Directors Responsibilities... 5 1.4 Business Continuity Planning Processes...
Global Public Health Intelligence Network (GPHIN) Reseau Mondial d Information en Santé Publique (RMISP) Michael Blench
1 Global Public Health Intelligence Network (GPHIN) Reseau Mondial d Information en Santé Publique (RMISP) Michael Blench GPHIN Technical Advisor & Project Coordinator 2 GPHIN - Background An early-warning
The Integrated Physical Security Handbook II Second Edition
This PDF file contains the following excerpts from the book: Table of Contents About the Authors Forward and Introduction The Integrated Physical Security Handbook II Second Edition 5-Step Process to Assess
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Bus incident management planning: Guidelines
Bus incident management planning: Guidelines What is incident management planning? Incident management planning is everything your business does to prepare for potential disruptive or damaging incidents.
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
