BIG DATA CALLS FOR BIG SECURITY!
|
|
|
- Mitchell Copeland
- 10 years ago
- Views:
Transcription
1 BIG DATA CALLS FOR BIG SECURITY! Branden R. Williams RSA Security Jason Rader RSA Security Session ID: DSP-F41 Session Classification: Intermediate
2 WHAT IS THIS SESSION ABOUT? Big Data Analytics They are the future! How do we deal with them in the security world? Unique Security Concerns With Big Data How can we learn from other security issues? What snakes may be lurking in the grass? Applied Knowledge A scenario! What to do? DO IT!
3 PREDICTIVE ANALYTICS THE FUTURE OF BI Big Data Not LOTS of data But many disparate sources with mixed structure Industry trends driving Big Data & analytics Storage is cheap Anywhere computing Hardware over-engineering (or distributed computing) Math is pretty awesome
4 WHAT ARE PREDICTIVE ANALYTICS? Simply, deriving value from big data! Complexly (is that a word?) Organizing the unorganized Heavy math use The search for leading indicators How do we use it? Business strategy Public safety (CDC,NOAA) Predict the future
5 WHO DOES THIS WELL TODAY? INVESTORS! Massive historical data Lots of math Sometimes bad math The search for trends Execute trades! The next step? Implications of social media See through the corporate veil Now we can focus on the individual!
6 DATA TYPE A BIG DATA FRAMEWORK Non-Transactional Data Social Analytics Decision Science Transactional Data Performance Management Data Exploration Measurement Experimentation BUSINESS OBJECTIVE Parise, S., Iyer, B., & Vesset, D. (2012). Four strategies to capture and create value from big data. Ivey Business Journal, 76(4), 1-5.
7 PREDICTIVE ANALYTICS THE WHY Businesses have data coming out of their ears SO DO THE BAD GUYS! Huge shift from the past Forensics example Unused data Can we find value? Business leaders must innovate 1 But focus on business model innovation PA can drive this! 1 Amit, R., & Zott, C. (2012). Creating value through business model innovation. MIT Sloan Management Review, 53(3),
8 DERIVED DATA & ANALYTICS (MORE SENSITIVE THAN ORIGINAL DATA!) Analytics automate data crunching Could become the new IP! Businesses act on output What about deriving sensitive info? PII Privacy issues! If I accurately guess your info, do I need to protect it?
9 PROBLEM OF DERIVED SENSITIVE DATA If I derive your PII, must I protect it? Law is WAY behind Compliance might be farther Do I have to protect data from aggregation? Flickr EXIF Reveals Client list Geotags Huge impact to business US = Case Law EU Privacy Updates
10 Payoff THE RELEVANCE OF DATA MASS Amount of data
11 REAL STORIES OF BIG DATA FUN How Target knew a teenager was pregnant before her own father did: Pause for story time! Implications: Target can predict due dates/sex Aggregations of data can accurately predict the future Better placement (upside?) Price discrimination Not Singular pieces of data! It s the CORRELATION that matters
12 THE COMPARTMENTALIZATION TECHNIQUE Big data requires big flexibility But that impacts security Think about SQL features: Views Complex Queries (with aggregates) Column-level RBAC Classic approaches (where have we solved this problem before) DBAs still a risk (so is the Data Scientist) Operators may not know what they are looking at
13 DATA SYNTHESIS TECHNIQUES Hacking the Coca Cola formula Can you derive the formula? YES YOU CAN! Shipping/Receiving/Production data Think Crypto plaintext attack KFC would be harder, but possible! IP/Strategy Derivation Attackers can figure out your IP by looking at data sets you don t necessarily protect Macro trends repeat themselves over multiple sets of data, can I fill the gaps from missing data sets?
14 PROTECTION SCHEMES WHERE TO START? Data mapping Where does data live? What is the full lifecycle of data? Raw WIP Data product Disposal How is it used by the business? Common Practices (with caveats) Governance Separation of Duties/RBAC Dev/UA/Prod
15 Value THE VALUE OF INFORMATION OVER TIME Max Value Area under this curve = money for information owner WIP Time Information eventually becomes a liability
16 HOW TO VIEW DATA AND ANALYTICS Secret Sauce Intellectual Property Software Vuln DB Corp Strategy Crown Jewels Easily Transferrable IP Actionable IP Encryption Keys Valuable to Competitors or Military Valuable to me Valuable if Lost Customer Analytics IT Configs Biz Processes Derivative Data Analytics for Sale Medical Records CC Data PII/PHI Data Unused Biz Data Disinformation COMPINT Defense Information Old Source Code Old IP Old/Retired Encryption Keys
17 SCENARIO Taco Corp is evaluating land for leasing of mineral rights They have proprietary data consisting of their own costs/profits related to past extractions This data is critical in understanding when a particular lease becomes profitable, trigging the process of extraction Two critical assets: Expected mineral output from plots of land Profitability triggers Potential public info: Existing leases with no extraction Leases with active extraction Commodity market for closing price of extracted minerals
18 SCENARIO (cont) Competitor (or real estate agent!) wants to get a jump on key land leases While they don t know the expected mineral outputs or the profitability triggers, can they synthesize? May know approximate timing of extraction through permits, media Can look up historical commodity value Search for patterns or thresholds Derive profitability approximations Constantly refine over time Get the jump on Taco Corp!
19 MOCKUP OF DATA SYNTHESIS Proprietary Data Sets Uh oh! Holes in the data? The Good s Public/Unpro tected Data Sets Hooray! Alternate Approximates!
20 WHAT DID WE LEARN? Large analytical computations with diverse data sets can be reconstructed (think RAID) What needs to be protected? Inputs & data sources Analytics process ( pre-ip ) Outputs (duh) Analytics process bonus: Learn where juicy data lives! Understand what can be substituted! What output is important to mgt! New third party data could mean M&A
21 Q/A Branden s Jason A
22 THANK YOU!
Using Social Engineering Tactics For Big Data Espionage
Using Social Engineering Tactics For Big Data Espionage Branden R. Williams Jason Rader RSA Session ID: DAS-301 Session Classification: General Interest What Is This Session About? Big Data Analytics They
BIG DATA CALLS FOR BIG SECURITY!
BIG DATA CALLS FOR BIG SECURITY! Jason Rader - Chief Security Strategist, RSA Global Services RSA, The Security Division of EMC Session ID: DAS-W02 Session Classification: General Interest Agenda Why Big
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
Big Data and Security: At the Edge of Prediction
Big Data and Security: At the Edge of Prediction Mark Seward Splunk Inc. Fred Wilmot Splunk Inc. Session ID: Session Classification: SPO2-T17 Intermediate The Way Cyber Adversaries Think Where is the most
Security visualisation
Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities by Marco
Big Data Big Security Problems? Ivan Damgård, Aarhus University
Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence
A Practical Guide to Data Classification
A Practical Guide to Data Classification or There and Back Again Michael A. Morabito Cardinal Health Agenda Demographics quiz Where we started Why bother? Buckets and labels Two pronged attack Overlap
BI/Analytics for NoSQL: Review of Architectures
BI/Analytics for NoSQL: Review of Architectures What we'll answer in 50 minutes Who is this guy? How do I enable AdHoc, self service reporting on NoSQL? How do I improve the performance of dashboards on
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
FERPA: Data & Transport Security Best Practices
FERPA: Data & Transport Security Best Practices April 2013 Mike Tassey Privacy Technical Assistance Center FERPA and Data Security Unlike HIPAA and other similar federal regulations, FERPA does not require
Test Data Management Concepts
Test Data Management Concepts BIZDATAX IS AN EKOBIT BRAND Executive Summary Test Data Management (TDM), as a part of the quality assurance (QA) process is more than ever in the focus among IT organizations
UNDERSTANDING COMPUTER FORENSICS. Doug White, PhD, CISSP, CCE Security Assurance Studies Roger Williams University
UNDERSTANDING COMPUTER FORENSICS Doug White, PhD, CISSP, CCE Security Assurance Studies Roger Williams University 2008 Secure Tec chnology, LLC. LET S TALK ABOUT SERIAL KILLERS BTK A serial killer who
Complex, true real-time analytics on massive, changing datasets.
Complex, true real-time analytics on massive, changing datasets. A NoSQL, all in-memory enabling platform technology from: Better Questions Come Before Better Answers FinchDB is a NoSQL, all in-memory
Data Science with Hadoop at Opower
Data Science with Hadoop at Opower Erik Shilts Advanced Analytics [email protected] What is Opower? A study: $$$ Turn off AC & Turn on Fan Environment Turn off AC & Turn on Fan Citizenship Turn off
Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc. 2011 2014. All Rights Reserved
Hortonworks & SAS Analytics everywhere. Page 1 A change in focus. A shift in Advertising From mass branding A shift in Financial Services From Educated Investing A shift in Healthcare From mass treatment
The Key to Successful Monitoring for Detection of Insider Attacks
The Key to Successful Monitoring for Detection of Insider Attacks Dawn M. Cappelli Randall F. Trzeciak Robert Floodeen Software Engineering Institute CERT Program Session ID: GRC-302 Session Classification:
Big Data As a Threat? An Alternative Approach to Cybersecurity
Big Data As a Threat? An Alternative Approach to Cybersecurity February 11, 2015 Brian Finch, Pillsbury Winthrop Shaw Pittman Brian Fox, PwC Pillsbury Winthrop Shaw Pittman LLP Data Breaches and Cyber
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Hexaware E-book on Predictive Analytics
Hexaware E-book on Predictive Analytics Business Intelligence & Analytics Actionable Intelligence Enabled Published on : Feb 7, 2012 Hexaware E-book on Predictive Analytics What is Data mining? Data mining,
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System
Solution Briefing Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System Tim Larson August 2009 Introduction Nokia Siemens Network s environment Company: Leading provider of mobile
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Bringing Big Data into the Enterprise
Bringing Big Data into the Enterprise Overview When evaluating Big Data applications in enterprise computing, one often-asked question is how does Big Data compare to the Enterprise Data Warehouse (EDW)?
Calculation of Minimum Distances. Minimum Distance to Means. Σi i = 1
Minimum Distance to Means Similar to Parallelepiped classifier, but instead of bounding areas, the user supplies spectral class means in n-dimensional space and the algorithm calculates the distance between
Virtual Data Warehouse Appliances
infrastructure (WX 2 and blade server Kognitio provides solutions to business problems that require acquisition, rationalization and analysis of large and/or complex data The Kognitio Technology and Data
Developing Secure Software in the Age of Advanced Persistent Threats
Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Evolution Of Cyber Threats & Defense Approaches
Evolution Of Cyber Threats & Defense Approaches Antony Abraham IT Architect, Information Security, State Farm Kevin McIntyre Tech Lead, Information Security, State Farm Agenda About State Farm Evolution
Traditional BI vs. Business Data Lake A comparison
Traditional BI vs. Business Data Lake A comparison The need for new thinking around data storage and analysis Traditional Business Intelligence (BI) systems provide various levels and kinds of analyses
RSA Security Analytics Security Analytics System Overview
RSA Security Analytics Security Analytics System Overview Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks
This Symposium brought to you by www.ttcus.com
This Symposium brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com Big Data Analytics as a Service (BDAaaS) Big Data
Fight fire with fire when protecting sensitive data
Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends
Quarterly Cybersecurity BILT Meeting October 10, 2012 Meeting Minutes ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends Stephen
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
THE OPEN UNIVERSITY OF TANZANIA FACULTY OF SCIENCE TECHNOLOGY AND ENVIRONMENTAL STUDIES BACHELOR OF SIENCE IN DATA MANAGEMENT
THE OPEN UNIVERSITY OF TANZANIA FACULTY OF SCIENCE TECHNOLOGY AND ENVIRONMENTAL STUDIES BACHELOR OF SIENCE IN DATA MANAGEMENT ODM 106.DATABASE CONCEPTS COURSE OUTLINE 1.0 Introduction This introductory
Intrusion Log Sharing University of Wisconsin-Madison
Intrusion Log Sharing University of Wisconsin-Madison John Bethencourt ([email protected]) Jason Franklin ([email protected]) Mary Vernon ([email protected]) 1 Talk Outline Background: Blacklists,
Enterprise Forensics and ediscovery (EnCase) Privacy Impact Assessment
Enterprise Forensics and ediscovery (EnCase) Privacy Impact Assessment PIA Approval Date Mar. 14, 2011 System Overview The Enterprise Forensics and ediscovery (EnCase) solution is a major application that
[15.03.03] Tax relief for new start-up companies
Last updated July 2015 1. Summary [15.03.03] Tax relief for new start-up companies [section 486C TCA 1997] Section 486C of the TCA 1997 was introduced by Finance (No. 2) Act 2008 and provides for relief
Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF
Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Course 20467A; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Designing Business Intelligence Solutions with Microsoft SQL Server 2012
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
DATABASE SECURITY - ATTACKS AND CONTROL METHODS
DATABASE SECURITY - ATTACKS AND CONTROL METHODS Emil BURTESCU 1 PhD, Associate Professor, Department of Accounting and Management Informatics, University of Pitesti, Pitesti, Romania E-mail: [email protected],
5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit
SharePoint Security Playbook 5 Lines of Defense You Need to Secure Your SharePoint Environment Contents IT S TIME TO THINK ABOUT SHAREPOINT SECURITY Challenge 1: Ensure access rights remain aligned with
Power Tools for Pivotal Tracker
Power Tools for Pivotal Tracker Pivotal Labs Dezmon Fernandez Victoria Kay Eric Dattore June 16th, 2015 Power Tools for Pivotal Tracker 1 Client Description Pivotal Labs is an agile software development
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
Big Data Scenario mit Power BI vs. SAP HANA Gerhard Brückl
Big Data Scenario mit Power BI vs. SAP HANA Gerhard Brückl About me Gerhard Brückl Working with Microsoft BI since 2006 Started working with SAP HANA in 2013 focused on Analytics and Reporting Blog: email:
Advanced Persistent Threats
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
An Overview of Big Data Technology and Security Implications
An Overview of Big Data Technology and Security Implications Tim Grance Senior Computer Scientist NIST Information Technology Laboratory [email protected] Disclaimer The ideas herein represent the author
Wikto how does it work and how do I use it?
Wikto how does it work and how do I use it? Introduction This document describes how to use Wikto to quickly and easily perform web server assessments. Before we start we need to know what Wikto does and
Simplifying the audit through innovation. PwC Accounting Symposium August 7, 2015. PwC Audit Transformation 19
Simplifying the audit through innovation PwC Accounting Symposium August 7, 2015 PwC Audit Transformation 19 Simplifying the audit through innovation A closer look What s driving our transformation Globalization
Audit Logging. Overall Goals
Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing
Performing a data mining tool evaluation
Performing a data mining tool evaluation Start with a framework for your evaluation Data mining helps you make better decisions that lead to significant and concrete results, such as increased revenue
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI
Product white paper ROI and SIEM How the RSA envision platform delivers an Industry-leading ROI This paper examines the Return on Investment (ROI) that a quality security information & event management
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
How to avoid building a data swamp
How to avoid building a data swamp Case studies in Hadoop data management and governance Mark Donsky, Product Management, Cloudera Naren Korenu, Engineering, Cloudera 1 Abstract DELETE How can you make
Data Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver
Data Mining: Unlocking the Intelligence in Your Data Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver 0 Today s Agenda Big Data What is it? Data Mining at a Glance Why the Accounting
CERULIUM TERADATA COURSE CATALOG
CERULIUM TERADATA COURSE CATALOG Cerulium Corporation has provided quality Teradata education and consulting expertise for over seven years. We offer customized solutions to maximize your warehouse. Prepared
MANAGING DAILY SECURITY OPERATIONS WITH LEAN AND KANBAN
MANAGING DAILY SECURITY OPERATIONS WITH LEAN AND KANBAN Gene Kim IT Revolution Press Branden R. Williams HireBranden.com Session ID: END-W22 Session Classification: Intermediate AGENDA AND OBJECTIVES Discuss
SCADA/ICS Security in an. [email protected] Twitter: @RobertMLee
SCADA/ICS Security in an Insecure Domain [email protected] Twitter: @RobertMLee Introduction CYA The opinions held and expressed by Robert M. Lee do not constitute or represent an opinion or
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently
Protecting Against SQLi in Real-Time
The OWASP Foundation http://www.owasp.org Protecting Against SQLi in Real-Time Stuart Hancock [email protected] [email protected] AGENDA SQL injection attacks primary database security
CAS8489 Delivering Security as a Service (SIEMaaS) November 2014
CAS8489 Delivering Security as a Service (SIEMaaS) November 2014 Usman Choudhary Senior Director [email protected] Rajeev Khanolkar CEO SecurView Agenda What is Security Monitoring? Definition & concepts
Win the race against time to stay ahead of cybercriminals
IBM Software Win the race against time to stay ahead of cybercriminals Get to the root cause of attacks fast with IBM Security QRadar Incident Forensics Highlights Help reduce the time required to determine
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject @NiddelCorp MLSec Project / Niddel MLSec
Encrypted Search for PPC
Encrypted Search for PPC A Lot of Hype, Little Impact May 2014 Lead contributors Suzie Rafla Head of Paid Search Havas Media [email protected] 2014 Havas Media Group 2 Background On Wednesday 9th
How to Leverage Information Technology and Win the Competitive Advantage
White Paper 3 Reasons SCADA Software is Going Nowhere How to Leverage Information Technology and Win the Competitive Advantage White Paper 3 Reasons SCADA Software is Going Nowhere How to Leverage Information
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions
Database Auditing & Security Brian Flasck - IBM Louise Joosse - BPSolutions Agenda Introduction Drivers for Better DB Security InfoSphere Guardium Solution Summary Netherlands Case Study The need for additional
PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW
PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW David Kittle Chief Information Officer Chris Ditmarsch Network & Security Administrator Smoker Friendly International / The Cigarette Store Corp
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
