DATA. Big Data Operational Excellence Ahead in the Cloud. Detect Patterns with Mass Correlation. Limit Surprise with Smart Data
|
|
|
- Neal Mills
- 10 years ago
- Views:
Transcription
1 FY11 FY12 FY13+ DATA Big Data Operational Excellence Ahead in the Cloud Detect Patterns with Mass Correlation Limit Surprise with Smart Data Accelerate Discovery with Visual Analytics Ira A. (Gus) Hunt Chief Technology Officer 18 October 2011
2 Our Mission We are the nation's first line of defense. We accomplish what others cannot accomplish and go where others cannot go. We carry out our mission by: Collecting information that reveals the plans, intentions and capabilities of our adversaries and provides the basis for decision and action. Producing timely analysis that provides insight, warning and opportunity to the President and decisionmakers charged with protecting and advancing America's interests. Conducting covert action at the direction of the President to preempt threats or achieve US policy objectives.
3 4 Big Bets Operational Big Data Acquire, federate, and position for multiple constituencies to securely exploit. Grow the haystack, magnify the needles. Talent Excellence Innovate infrastructure operations and provisioning, create an authoritative source on our asset base, and run IT like a business. Serve CIA Management by supporting the IC Assume a leadership role in IC activities that benefit the CIA Focus on continuous learning and diversity of thought, experience, background
4 Key Technology Enablers Advanced Mission Analytics World-class abilities to discover patterns, correlate information, understand plans and intentions, and find and identify operational targets in a sea of data Enterprise Widgets and Services A customizable, integrated and adaptive webtop that lets analysts, ops officers, and targeters to have it their way. Security as a Enterprise Data Management--the Service One environment, all data, protected and secure using common security services such as: ubiquitous encryption, enterprise authentication, audit, DRM, secure ID propagation, and Gold Version C&A. Data Harbor An ultra-high performance data environment that enables CIA missions to acquire, federate, and position and securely exploit huge volumes data. Cloud Computing Ruthlessly standardized, rigorously automated, dynamic and elastic commodity computing environment. Massive capacity ahead of demand. Speed for mission need.
5 Our World Today Economic climate Astounding commercial IT capabilities Shape-shifting, technologically sophisticated enemies Public expectations of intelligence perfection - connecting the dots Deluge of multi-lingual data Video, audio, Tweets, SMS, etc. The Perfect Storm LOL, 555, 大 笑 mdr,, 笑,هاها Лол, asg, rs 4
6 It s a BIG Data World 5
7 Google >1 Trillion Indexed URLs 6
8 Google s index >100 Petabytes 7
9 YouTube >789 Petabytes 8
10 >144 Million Tweets per day 9
11 Facebook Holdings >90 Petabytes 10
12 Sensors 11
13 Our Job Leverage the Big Data world Find the Information that Matters Connect the Dots Understand the Plans of our Adversaries Prevent an attack, Save lives, Safeguard our national security
14 Why We Care 13
15 Why We Care 14
16 The Problem 15
17 Our Problem: Which 5K Don t know the future value of a dot today We cannot connect dots we don t have The old collect, winnow, dissem model fails spectacularly in the Big Data world The few cannot know the needs of the many Secure the data, Connect the data, Empower the user
18 Our Reality Significant budget cuts are coming IT is under enormous pressure to reduce spending IT must deliver new and better capabilities--faster Instability is rising across the globe Speed and agility are paramount Operational Excellence is about solving all of the above--simultaneously 17
19 Let s talk Cloud 18
20 = Big Data Continuous Services Unbounded Scale Capacity ahead of demand Operational Excellence Radical Efficiency Rigorous Standardization Ruthless Automation Failure Tolerant Redundant by Design Available by Default 19
21 Capacity ahead of demand Make IT Frictionless for Mission Zero wait, zero effort Like 110 out of the wall Like dial tone Plug in and go Provide CIA and the IC Continuous Services Unbounded Scale Radical Efficiency Rigorous Standardization Ruthless Automation Failure Tolerant Redundant by Design Available by Default 20
22 Big Data Mass analytics Complex reasoning Hypothesis generation Answers ahead of questions Cloud Operational Excellence Radical efficiency Rigorous standards Security ahead of need Capacity ahead of demand Computing
23 Its not about the Cloud Its about: 1 Big Data Acquire, federate, and position for multiple constituencies to securely exploit. Grow the haystack, magnify the needles. Connect the dots. 2 Operational Excellence Innovate infrastructure operations and provisioning, create an authoritative source on our asset base, and run IT like a business. Cloud is the mechanism to achieve both securely
24 Questions The journey of a thousand miles begins with a single step. Lao Tzu
Securing the Cloud infrastructure with IBM Dynamic Cloud Security
Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: [email protected] 12015 IBM Corporation Cloud is rapidly transforming
Becoming an Agile Digital Detective
February 2012 IBM Enterprise Content Management software Becoming an Agile Digital Detective Page 2 Web-based social networks connect and empower people to find like-minded individuals to quickly fuel
Talousjohto muutosagenttina ja informaatiotulvan tulkkina
Juha Teljo Business Intelligence Solution Executive Talousjohto muutosagenttina ja informaatiotulvan tulkkina Business Analytics software Finance needs to improve its effectiveness in order to deliver
Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary
Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary 2 Security Technology Vision 2016 Empowering Your Cyber Defenders to Enable Digital Trust Fighter
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Big data and its transformational effects
Big data and its transformational effects Professor Fai Cheng Head of Research & Technology September 2015 Working together for a safer world Topics Lloyd s Register Big Data Data driven world Data driven
Danny Wang, Ph.D. Vice President of Business Strategy and Risk Management Republic Bank
Danny Wang, Ph.D. Vice President of Business Strategy and Risk Management Republic Bank Agenda» Overview» What is Big Data?» Accelerates advances in computer & technologies» Revolutionizes data measurement»
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Are You Ready for Big Data?
Are You Ready for Big Data? Jim Gallo National Director, Business Analytics April 10, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
Are You Ready for Big Data?
Are You Ready for Big Data? Jim Gallo National Director, Business Analytics February 11, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?
Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1
Powerful analytics and enterprise security in a single platform microstrategy.com 1 Make faster, better business decisions with easy, powerful, and secure tools to explore data and share insights. Enterprise-grade
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
We are Big Data A Sonian Whitepaper
EXECUTIVE SUMMARY Big Data is not an uncommon term in the technology industry anymore. It s of big interest to many leading IT providers and archiving companies. But what is Big Data? While many have formed
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Digitization of Enterprise - New Style of IT
Digitization of Enterprise - New Style of IT Neeraj Tolmare Oct 2014 What happens in an Internet Minute? 20 identity thefts 20 million photo views 1.3 million video views 6 million Facebook views 100,000
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Accelerating Complex Event Processing with Memory- Centric DataBase (MCDB)
Accelerating Complex Event Processing with Memory- Centric DataBase (MCDB) A FedCentric Technologies White Paper January 2008 Executive Summary Events happen in real-time; orders are taken, calls are placed,
ETCIC Internships Open to Sophomores:
ETCIC Internships Open to Sophomores: If interested in applying for any of these positions, please email [email protected] with your resume (and cover letter if required) by Sunday, 9/20 at 11:59pm.
Secure Data Transmission Solutions for the Management and Control of Big Data
Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE
data driven government
Position paper data driven government preparing for the age of the citizen Insights for tomorrow s world Governments are awash with information, and they face a deluge of data as far into the future as
Better Together: Microsoft Office 365 & Symantec Office 365
#SymVisionEmea #SymVisionEmea Better Together: Microsoft Office 365 & Symantec Office 365 & Symantec Mike Smart Product Marketing Information SECURITY David Moseley Product Marketing Information MANAGEMENT
Banking On A Customer-Centric Approach To Data
Banking On A Customer-Centric Approach To Data Putting Content into Context to Enhance Customer Lifetime Value No matter which company they interact with, consumers today have far greater expectations
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Simply Sophisticated. Information Security and Compliance
Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
TS03: Operational Excellence by Leveraging Internet of Things Technologies
TS03: Operational Excellence by Leveraging Internet of Things Technologies Virendra Chaudhari- Industry Solutions Manufacturing- Microsoft Imtiaz Javeed Product Manager -Visualization & Information Software
How To Understand The Benefits Of Big Data
Findings from the research collaboration of IBM Institute for Business Value and Saïd Business School, University of Oxford Analytics: The real-world use of big data How innovative enterprises extract
Copyright 2013 Splunk Inc. Introducing Splunk 6
Copyright 2013 Splunk Inc. Introducing Splunk 6 Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected performance
The Future of the Advanced SOC
The Future of the Advanced SOC Developing a platform for more effective security management and compliance Steven Van Ormer RSA Technical Security Consultant 1 Agenda Today s Security Landscape and Why
Government Technology Trends to Watch in 2014: Big Data
Government Technology Trends to Watch in 2014: Big Data OVERVIEW The federal government manages a wide variety of civilian, defense and intelligence programs and services, which both produce and require
Analyzing Big Data: The Path to Competitive Advantage
White Paper Analyzing Big Data: The Path to Competitive Advantage by Marcia Kaplan Contents Introduction....2 How Big is Big Data?................................................................................
CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise
CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise 5 APR 2011 1 2005... Advanced Analytics Harnessing Data for the Warfighter I2E GIG Brigade Combat Team Data Silos DCGS LandWarNet
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
BIG DATA ANALYTICS For REAL TIME SYSTEM
BIG DATA ANALYTICS For REAL TIME SYSTEM Where does big data come from? Big Data is often boiled down to three main varieties: Transactional data these include data from invoices, payment orders, storage
Outlook for Cloud technology in Big Data and Mobility
2014 Outlook for Cloud technology in Big Data and Mobility Wayne Collette, CFA, Senior Portfolio Manager Cloud technology is a significant and ongoing trend affecting the technology industry. A new breed
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Rethinking Your Finance Functions
Rethinking Your Finance Functions Budgeting, Planning & Technology BDO Canada Daniel Caringi ( [email protected] ) September 25th, 2014 A journey of a thousand miles must begin with a single step. - Lao
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
VMware Cloud Operations Management Technology Consulting Services
VMware Cloud Operations Management Technology Consulting Services VMware Technology Consulting Services for Cloud Operations Management The biggest hurdle [that CIOs face as they move infrastructure and
The Amazing Future of the IoE
The Amazing Future of the IoE Shaun Kirby CTO, Cisco Consulting Services November 2014 The Internet of Everything: People, Process, Data, and Things People Connecting people in more relevant, valuable
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
Whitepaper. Advanced Threat Hunting with Carbon Black
Advanced Threat Hunting with Carbon Black TABLE OF CONTENTS Overview Threat Hunting Defined Existing Challenges and Solutions Prioritize Endpoint Data Collection Over Detection Leverage Comprehensive Threat
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
The Enterprise Data Hub and The Modern Information Architecture
The Enterprise Data Hub and The Modern Information Architecture Dr. Amr Awadallah CTO & Co-Founder, Cloudera Twitter: @awadallah 1 2013 Cloudera, Inc. All rights reserved. Cloudera Overview The Leader
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Vindicator Security Solutions. Security for Mission-Critical Applications
Vindicator Security Solutions Security for Mission-Critical Applications About Vindicator Security Solutions Photo courtesy of U.S. Department of Defense. Military, Federal and State Governments Ports
Two Recent LE Use Cases
Two Recent LE Use Cases Case Study I Have A Bomb On This Plane (Miami Airport) In January 2012, an airline passenger tweeted she had a bomb on a Jet Blue commercial aircraft at the Miami International
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things
Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things Mac Devine CTO, IBM Cloud Services Division IBM Distinguished Engineer [email protected] twitter: mac_devine Forecast for
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
MicroStrategy Enterprise Mobile. Increase productivity and efficiency by mobilizing your enterprise today
MicroStrategy Enterprise Mobile Increase productivity and efficiency by mobilizing your enterprise today icrostrategy M tegy Workforces are Mobile 34% more productive when Pla using mobile apps. obilie
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach
Unlocking The Value of the Deep Web Harvesting Big Data that Google Doesn t Reach Introduction Every day, untold millions search the web with Google, Bing and other search engines. The volumes truly are
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Big Data. Fast Forward. Putting data to productive use
Big Data Putting data to productive use Fast Forward What is big data, and why should you care? Get familiar with big data terminology, technologies, and techniques. Getting started with big data to realize
SOCIAL MEDIA MONITORING AND SENTIMENT ANALYSIS SYSTEM
Kuwait National Assembly Media Department SOCIAL MEDIA MONITORING AND SENTIMENT ANALYSIS SYSTEM Dr. Salah Alnajem Associate Professor of Computational Linguistics and Natural Language Processing, Kuwait
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
IoT Analytics: Four Key Essentials and Four Target Industries
IoT Analytics: Four Key Essentials and Four Target Industries 1 Introduction Analysts and IT personnel across all industries seek technology to better engage and manage data generated by the Internet of
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
BIG DATA FUNDAMENTALS
BIG DATA FUNDAMENTALS Timeframe Minimum of 30 hours Use the concepts of volume, velocity, variety, veracity and value to define big data Learning outcomes Critically evaluate the need for big data management
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Leverages of Symantec and Enterprise Vault
The Navigator for Enterprise Solutions CIOREVIEW.COM January 05-2015 20 Most Promising Symantec Solution Providers As the number and types of cyber threats continue to increase, the information security
ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE
ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE A White Paper prepared by the AFCEA Intelligence Committee April 2008 Serving Intelligence Professionals and their Community SpringIntel08_WhitePaperCover
Big Data better business benefits
Big Data better business benefits Paul Edwards, HouseMark 2 December 2014 What I ll cover.. Explain what big data is Uses for Big Data and the potential for social housing What Big Data means for HouseMark
IBM Software Top tips for securing big data environments
IBM Software Top tips for securing big data environments Why big data doesn t have to mean big security challenges 2 Top Comprehensive tips for securing data big protection data environments for physical,
