BIG DATA CALLS FOR BIG SECURITY!



Similar documents
Using Social Engineering Tactics For Big Data Espionage

BIG DATA CALLS FOR BIG SECURITY!

Security within a development lifecycle. Enhancing product security through development process improvement

RSA Security Anatomy of an Attack Lessons learned

Reducing Cyber Risk in Your Organization

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Big Data and Security: At the Edge of Prediction

Security visualisation

Big Data Big Security Problems? Ivan Damgård, Aarhus University

A Practical Guide to Data Classification

BI/Analytics for NoSQL: Review of Architectures

Teradata and Protegrity High-Value Protection for High-Value Data

FERPA: Data & Transport Security Best Practices

Test Data Management Concepts

UNDERSTANDING COMPUTER FORENSICS. Doug White, PhD, CISSP, CCE Security Assurance Studies Roger Williams University

Complex, true real-time analytics on massive, changing datasets.

Data Science with Hadoop at Opower

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc All Rights Reserved

The Key to Successful Monitoring for Detection of Insider Attacks

Big Data As a Threat? An Alternative Approach to Cybersecurity

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Hexaware E-book on Predictive Analytics

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Bringing Big Data into the Enterprise

Calculation of Minimum Distances. Minimum Distance to Means. Σi i = 1

Virtual Data Warehouse Appliances

Developing Secure Software in the Age of Advanced Persistent Threats

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Evolution Of Cyber Threats & Defense Approaches

Traditional BI vs. Business Data Lake A comparison

RSA Security Analytics Security Analytics System Overview

This Symposium brought to you by

Fight fire with fire when protecting sensitive data

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Comprehensive Advanced Threat Defense

THE OPEN UNIVERSITY OF TANZANIA FACULTY OF SCIENCE TECHNOLOGY AND ENVIRONMENTAL STUDIES BACHELOR OF SIENCE IN DATA MANAGEMENT

Intrusion Log Sharing University of Wisconsin-Madison

Enterprise Forensics and ediscovery (EnCase) Privacy Impact Assessment

[ ] Tax relief for new start-up companies

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF

Data Refinery with Big Data Aspects

Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Course 20467A; 5 Days

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

DATABASE SECURITY - ATTACKS AND CONTROL METHODS

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

Power Tools for Pivotal Tracker

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data Scenario mit Power BI vs. SAP HANA Gerhard Brückl

Advanced Persistent Threats

An Overview of Big Data Technology and Security Implications

Wikto how does it work and how do I use it?

Simplifying the audit through innovation. PwC Accounting Symposium August 7, PwC Audit Transformation 19

Audit Logging. Overall Goals

Performing a data mining tool evaluation

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

How to avoid building a data swamp

Data Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver

CERULIUM TERADATA COURSE CATALOG

MANAGING DAILY SECURITY OPERATIONS WITH LEAN AND KANBAN

SCADA/ICS Security in an.

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Protecting Against SQLi in Real-Time

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Win the race against time to stay ahead of cybercriminals

SafeNet DataSecure vs. Native Oracle Encryption

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

Encrypted Search for PPC

How to Leverage Information Technology and Win the Competitive Advantage

Update On Smart Grid Cyber Security

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Transcription:

BIG DATA CALLS FOR BIG SECURITY! Branden R. Williams RSA Security Jason Rader RSA Security Session ID: DSP-F41 Session Classification: Intermediate

WHAT IS THIS SESSION ABOUT? Big Data Analytics They are the future! How do we deal with them in the security world? Unique Security Concerns With Big Data How can we learn from other security issues? What snakes may be lurking in the grass? Applied Knowledge A scenario! What to do? DO IT!

PREDICTIVE ANALYTICS THE FUTURE OF BI Big Data Not LOTS of data But many disparate sources with mixed structure Industry trends driving Big Data & analytics Storage is cheap Anywhere computing Hardware over-engineering (or distributed computing) Math is pretty awesome

WHAT ARE PREDICTIVE ANALYTICS? Simply, deriving value from big data! Complexly (is that a word?) Organizing the unorganized Heavy math use The search for leading indicators How do we use it? Business strategy Public safety (CDC,NOAA) Predict the future

WHO DOES THIS WELL TODAY? INVESTORS! Massive historical data Lots of math Sometimes bad math The search for trends Execute trades! The next step? Implications of social media See through the corporate veil Now we can focus on the individual!

DATA TYPE A BIG DATA FRAMEWORK Non-Transactional Data Social Analytics Decision Science Transactional Data Performance Management Data Exploration Measurement Experimentation BUSINESS OBJECTIVE Parise, S., Iyer, B., & Vesset, D. (2012). Four strategies to capture and create value from big data. Ivey Business Journal, 76(4), 1-5.

PREDICTIVE ANALYTICS THE WHY Businesses have data coming out of their ears SO DO THE BAD GUYS! Huge shift from the past Forensics example Unused data Can we find value? Business leaders must innovate 1 But focus on business model innovation PA can drive this! 1 Amit, R., & Zott, C. (2012). Creating value through business model innovation. MIT Sloan Management Review, 53(3), 41-49.

DERIVED DATA & ANALYTICS (MORE SENSITIVE THAN ORIGINAL DATA!) Analytics automate data crunching Could become the new IP! Businesses act on output What about deriving sensitive info? PII Privacy issues! If I accurately guess your info, do I need to protect it?

PROBLEM OF DERIVED SENSITIVE DATA If I derive your PII, must I protect it? Law is WAY behind Compliance might be farther Do I have to protect data from aggregation? Flickr EXIF Reveals Client list Geotags Huge impact to business US = Case Law EU Privacy Updates

Payoff THE RELEVANCE OF DATA MASS Amount of data

REAL STORIES OF BIG DATA FUN How Target knew a teenager was pregnant before her own father did: Pause for story time! Implications: Target can predict due dates/sex Aggregations of data can accurately predict the future Better placement (upside?) Price discrimination Not Singular pieces of data! It s the CORRELATION that matters

THE COMPARTMENTALIZATION TECHNIQUE Big data requires big flexibility But that impacts security Think about SQL features: Views Complex Queries (with aggregates) Column-level RBAC Classic approaches (where have we solved this problem before) DBAs still a risk (so is the Data Scientist) Operators may not know what they are looking at

DATA SYNTHESIS TECHNIQUES Hacking the Coca Cola formula Can you derive the formula? YES YOU CAN! Shipping/Receiving/Production data Think Crypto plaintext attack KFC would be harder, but possible! IP/Strategy Derivation Attackers can figure out your IP by looking at data sets you don t necessarily protect Macro trends repeat themselves over multiple sets of data, can I fill the gaps from missing data sets?

PROTECTION SCHEMES WHERE TO START? Data mapping Where does data live? What is the full lifecycle of data? Raw WIP Data product Disposal How is it used by the business? Common Practices (with caveats) Governance Separation of Duties/RBAC Dev/UA/Prod

Value THE VALUE OF INFORMATION OVER TIME Max Value Area under this curve = money for information owner WIP Time Information eventually becomes a liability

HOW TO VIEW DATA AND ANALYTICS Secret Sauce Intellectual Property Software Vuln DB Corp Strategy Crown Jewels Easily Transferrable IP Actionable IP Encryption Keys Valuable to Competitors or Military Valuable to me Valuable if Lost Customer Analytics IT Configs Biz Processes Derivative Data Analytics for Sale Medical Records CC Data PII/PHI Data Unused Biz Data Disinformation COMPINT Defense Information Old Source Code Old IP Old/Retired Encryption Keys

SCENARIO Taco Corp is evaluating land for leasing of mineral rights They have proprietary data consisting of their own costs/profits related to past extractions This data is critical in understanding when a particular lease becomes profitable, trigging the process of extraction Two critical assets: Expected mineral output from plots of land Profitability triggers Potential public info: Existing leases with no extraction Leases with active extraction Commodity market for closing price of extracted minerals

SCENARIO (cont) Competitor (or real estate agent!) wants to get a jump on key land leases While they don t know the expected mineral outputs or the profitability triggers, can they synthesize? May know approximate timing of extraction through permits, media Can look up historical commodity value Search for patterns or thresholds Derive profitability approximations Constantly refine over time Get the jump on Taco Corp!

MOCKUP OF DATA SYNTHESIS Proprietary Data Sets Uh oh! Holes in the data? The Good s Public/Unpro tected Data Sets Hooray! Alternate Approximates!

WHAT DID WE LEARN? Large analytical computations with diverse data sets can be reconstructed (think RAID) What needs to be protected? Inputs & data sources Analytics process ( pre-ip ) Outputs (duh) Analytics process bonus: Learn where juicy data lives! Understand what can be substituted! What output is important to mgt! New third party data could mean M&A

Q/A Branden Williams @BrandenWilliam s Jason Rader @JasonRaderRS A

THANK YOU!