Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Similar documents
How To Create An Insight Analysis For Cyber Security

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice

Defending against modern cyber threats

Playing Our Part in Responding to National Threats

The Business Value of Predictive Analytics

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

IBM Content Analytics: Rapid insight for crime investigation

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview

VERINT Company Introduction. Gabriel Horowitz VP Sales Europe

Solve your toughest challenges with data mining

Making critical connections: predictive analytics in government

National Initiative for Cybersecurity Education

The UK cyber security strategy: Landscape review. Cross-government

Business Plan 2012/13

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN)

Zak Khan Director, Advanced Cyber Defence

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

Obtaining Enterprise Cybersituational

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

IBM Technology in Public Safety

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

How To Get A Security Degree In Australia

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

AUSTRAC. supervision strategy

Transforming your Fraud & Financial Crimes Detection & Prevention Capabilities through the Power of Analytics. Laura Hutton - SAS

Demystifying Big Data Government Agencies & The Big Data Phenomenon

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Maximizing Return and Minimizing Cost with the Decision Management Systems

Data Fusion Centers. Transforming Public Safety Information into Actionable Knowledge

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

THE STRATEGIC POLICING REQUIREMENT. July 2012

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

IBM Big Data in Government

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission

Metrics that Matter Security Risk Analytics

NEEDLE STACKS & BIG DATA: USING EVENT STREAM PROCESSING FOR RISK, SURVEILLANCE & SECURITY ANALYTICS IN CAPITAL MARKETS

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

2. Cyber security research in the Netherlands

Addressing Cyber Risk Building robust cyber governance

WORLDWIDE SECURITY PROTECTION

Cybersecurity The role of Internal Audit

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

Strengthen security with intelligent identity and access management

Arizona Counter Terrorism Information Center

Real World Application and Usage of IBM Advanced Analytics Technology

A Primer on Cyber Threat Intelligence

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

The Department of the Treasury established the Financial Crimes

On-Line Privacy Statement

FAQs Organised Crime and Anti-corruption Legislation Bill

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

An Esri White Paper April 2011 Geospatial Intelligence for Fusion Centers

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

Cyber Crime ACC Crime

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

National Security and Cyber Defense with Big Data

The Smart Archive strategy from IBM

Supply Chain Security Training Needs for Law Enforcement Agencies

IBM Big Data Analytics Vienna, 2013 May 13

Making Critical Connections: Predictive Analytics in Government

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

2 Gabi Siboni, 1 Senior Research Fellow and Director,

An Overview of Cybersecurity and Cybercrime in Taiwan

Big Data Analytics Best Practices

Industry Impact of Big Data in the Cloud: An IBM Perspective

Module 3 Applications of Information Systems: Enterprise Systems

Analytics Centre of Excellence: Roles, Responsibilities and Challenges

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Greater Manchester Police. Police service becomes more agile

Data Refinery with Big Data Aspects

Cybercrime: risks, penalties and prevention

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Solve Your Toughest Challenges with Data Mining

CEOP Relationship Management Strategy

INFRAGARD.ORG. Portland FBI. Unclassified 1

Transcription:

Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation

Agenda Introductions and background Enhancing Safeguards Through Information Analysis: Business Analytics Tools Information analytics, information sharing, collaboration Questions 2 General Use

IBM i2 - A Global Presence Founded in 1990 24 years of delivering capability to our customers 2 Queens award for innovation and excellence Pervasive in market with over 4500 clients More than 350,000 users in 150 countries in 18 languages Used by 8 of the top 10 largest companies, 12 of top 20 banks 25 of the 28 NATO member countries 100% of UK police forces 90% of all target packages in Iraq and Afghanistan were and are developed using i2 solutions 80% of National Security agencies worldwide Every US Federal Law Enforcement agency and organization 4000 US Police jurisdictions

i2 tackling diverse set of critical issues National Security Defense Law Enforcement Private Sector Government Counter Terrorism Counter Intelligence Intelligence Analysis Border Security Cyber Risk Establishing Civilian Structures Counter Intelligence Intelligence Analysis Target Analysis and Defense Peacekeeping Force Protection Pattern of Life Analysis Human Terrain Mapping Tactical Lead Generation Counter Terrorism Major Investigations Organized Crime Neighborhood/ Community Policing Public Order/Major Event Management Volume Crime Fusion Centers Security Investigations Industry Oversight & Compliance Cybercrime Risk Management Anti-Money Laundering Fraud Industry Oversight & Compliance Cybercrime Securities Investigations Anti-Money Laundering Fraud

Changing landscape of threats/risk Organisations are being asked to: Identify and respond to new and diverse threats Act quickly, with greater accuracy Spot new trends early Reduced resources Reductions in headcount Budget restrictions affecting all industries

What many customers know i2 for today

Understand complex relationships

Understanding events over time

even if the times are uncertain

Understanding patterns of behaviour

Understanding where

Social Network Analysis

Social Network Analysis

Information to Intelligence to Action quickly and effectively to improve response.and enable remedial action

Multiple options for user access

Organisational capability progression How can we share intelligence more effectively across the organisation? How can we provide lightweight investigation & analysis tools without being constrained to the desktop? How can we integrate and extend the application? How can we analyse big data? How can we improve data sharing and collaboration? How do I take advantage of cognitive computing? How do we run on the cloud? COTS Desktop IntelliShare Intelligence Analysis Platform (IAP) Solutions Rich Desktop Clients Rich Desktop Clients Web Client Rich Desktop Client Web Client Rich Desktop Clients Web Client & Portal Intelligence repository Intelligence repository Web Services Web Services IAP Service Bus IBM Integrations IAP Big Data

Part of a bigger organisational picture Owned / Open Text / Rich Structured / Unstructured High Performance Warehouse Mining & Query Analytics Big Data Mining Data Acquisition Text Mining and Extraction Data on demand Federated data Big Data Acquisition and Analysis Real Time Data Analysis and Detection Data Analysis and Detection Data Analytics Security Vulnerability Detection Entity Matching and Resolution Data and Analytic Federation /Fusion i2 Investigation & Analysis Visual Investigation and Analytics Case Management Collaboration Operational Interaction Reporting Dissemination Informed Decision Making & Intelligent Led Operations VALUE

Contact - Julian.Midwinter@uk.ibm.com