DATA. Big Data Operational Excellence Ahead in the Cloud. Detect Patterns with Mass Correlation. Limit Surprise with Smart Data



Similar documents
Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Becoming an Agile Digital Detective

Talousjohto muutosagenttina ja informaatiotulvan tulkkina

Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Big data and its transformational effects

Danny Wang, Ph.D. Vice President of Business Strategy and Risk Management Republic Bank

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Microsoft s cybersecurity commitment

Are You Ready for Big Data?

A strategic approach to fraud

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Gaining the upper hand in today s cyber security battle

Are You Ready for Big Data?

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

We are Big Data A Sonian Whitepaper

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Digitization of Enterprise - New Style of IT

DoD Strategy for Defending Networks, Systems, and Data

Accelerating Complex Event Processing with Memory- Centric DataBase (MCDB)

ETCIC Internships Open to Sophomores:

Secure Data Transmission Solutions for the Management and Control of Big Data

data driven government

Better Together: Microsoft Office 365 & Symantec Office 365

Banking On A Customer-Centric Approach To Data

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Simply Sophisticated. Information Security and Compliance

Data Refinery with Big Data Aspects

TS03: Operational Excellence by Leveraging Internet of Things Technologies

How To Understand The Benefits Of Big Data

Copyright 2013 Splunk Inc. Introducing Splunk 6

The Future of the Advanced SOC

Government Technology Trends to Watch in 2014: Big Data

Analyzing Big Data: The Path to Competitive Advantage

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

1. Understanding Big Data

BIG DATA ANALYTICS For REAL TIME SYSTEM

Outlook for Cloud technology in Big Data and Mobility

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Rethinking Your Finance Functions

Defending against modern cyber threats

VMware Cloud Operations Management Technology Consulting Services

The Amazing Future of the IoE

Cybersecurity Delivering Confidence in the Cyber Domain

Whitepaper. Advanced Threat Hunting with Carbon Black

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

The Enterprise Data Hub and The Modern Information Architecture

Covert Operations: Kill Chain Actions using Security Analytics

Vindicator Security Solutions. Security for Mission-Critical Applications

Two Recent LE Use Cases

IT Security & Compliance. On Time. On Budget. On Demand.

Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things

Preemptive security solutions for healthcare

MicroStrategy Enterprise Mobile. Increase productivity and efficiency by mobilizing your enterprise today

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach

Enterprise-Grade Security from the Cloud

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Big Data. Fast Forward. Putting data to productive use

SOCIAL MEDIA MONITORING AND SENTIMENT ANALYSIS SYSTEM

Cyber Security Metrics Dashboards & Analytics

IoT Analytics: Four Key Essentials and Four Target Industries

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

BIG DATA FUNDAMENTALS

Obtaining Enterprise Cybersituational

Leverages of Symantec and Enterprise Vault

ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE

Big Data better business benefits

IBM Software Top tips for securing big data environments

Transcription:

FY11 FY12 FY13+ DATA Big Data Operational Excellence Ahead in the Cloud Detect Patterns with Mass Correlation Limit Surprise with Smart Data Accelerate Discovery with Visual Analytics Ira A. (Gus) Hunt Chief Technology Officer 18 October 2011

Our Mission We are the nation's first line of defense. We accomplish what others cannot accomplish and go where others cannot go. We carry out our mission by: Collecting information that reveals the plans, intentions and capabilities of our adversaries and provides the basis for decision and action. Producing timely analysis that provides insight, warning and opportunity to the President and decisionmakers charged with protecting and advancing America's interests. Conducting covert action at the direction of the President to preempt threats or achieve US policy objectives.

4 Big Bets 1 2 3 4 Operational Big Data Acquire, federate, and position for multiple constituencies to securely exploit. Grow the haystack, magnify the needles. Talent Excellence Innovate infrastructure operations and provisioning, create an authoritative source on our asset base, and run IT like a business. Serve CIA Management by supporting the IC Assume a leadership role in IC activities that benefit the CIA Focus on continuous learning and diversity of thought, experience, background

1 2 3 4 5 5 Key Technology Enablers Advanced Mission Analytics World-class abilities to discover patterns, correlate information, understand plans and intentions, and find and identify operational targets in a sea of data Enterprise Widgets and Services A customizable, integrated and adaptive webtop that lets analysts, ops officers, and targeters to have it their way. Security as a Enterprise Data Management--the Service One environment, all data, protected and secure using common security services such as: ubiquitous encryption, enterprise authentication, audit, DRM, secure ID propagation, and Gold Version C&A. Data Harbor An ultra-high performance data environment that enables CIA missions to acquire, federate, and position and securely exploit huge volumes data. Cloud Computing Ruthlessly standardized, rigorously automated, dynamic and elastic commodity computing environment. Massive capacity ahead of demand. Speed for mission need.

Our World Today Economic climate Astounding commercial IT capabilities Shape-shifting, technologically sophisticated enemies Public expectations of intelligence perfection - connecting the dots Deluge of multi-lingual data Video, audio, Tweets, SMS, etc. The Perfect Storm LOL, 555, 大 笑 mdr,, 笑,هاها Лол, asg, rs 4

It s a BIG Data World 5

Google >1 Trillion Indexed URLs 6

Google s index >100 Petabytes 7

YouTube >789 Petabytes 8

>144 Million Tweets per day 9

Facebook Holdings >90 Petabytes 10

Sensors 11

Our Job 1 2 3 4 Leverage the Big Data world Find the Information that Matters Connect the Dots Understand the Plans of our Adversaries Prevent an attack, Save lives, Safeguard our national security

Why We Care 13

Why We Care 14

The Problem 15

Our Problem: Which 5K 1 2 3 Don t know the future value of a dot today We cannot connect dots we don t have The old collect, winnow, dissem model fails spectacularly in the Big Data world The few cannot know the needs of the many Secure the data, Connect the data, Empower the user

Our Reality Significant budget cuts are coming IT is under enormous pressure to reduce spending IT must deliver new and better capabilities--faster Instability is rising across the globe Speed and agility are paramount Operational Excellence is about solving all of the above--simultaneously 17

Let s talk Cloud 18

= Big Data Continuous Services Unbounded Scale Capacity ahead of demand Operational Excellence Radical Efficiency Rigorous Standardization Ruthless Automation Failure Tolerant Redundant by Design Available by Default 19

Capacity ahead of demand Make IT Frictionless for Mission Zero wait, zero effort Like 110 out of the wall Like dial tone Plug in and go Provide CIA and the IC Continuous Services Unbounded Scale Radical Efficiency Rigorous Standardization Ruthless Automation Failure Tolerant Redundant by Design Available by Default 20

Big Data Mass analytics Complex reasoning Hypothesis generation Answers ahead of questions Cloud Operational Excellence Radical efficiency Rigorous standards Security ahead of need Capacity ahead of demand Computing

Its not about the Cloud Its about: 1 Big Data Acquire, federate, and position for multiple constituencies to securely exploit. Grow the haystack, magnify the needles. Connect the dots. 2 Operational Excellence Innovate infrastructure operations and provisioning, create an authoritative source on our asset base, and run IT like a business. Cloud is the mechanism to achieve both securely

Questions The journey of a thousand miles begins with a single step. Lao Tzu