BIG DATA & CYBER DEFENSE · 2018-08-12 · BIG DATA –WHAT IS NEXT •Predictive analytics/machine learning with big data. •Open Source dominance in big data technologies. •Data

Post on 08-Jun-2020

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

BIG DATA & CYBER DEFENSE ANDY PILATO, CHIEF TECHNOLOGY OFFICER (CTO)

OUTLINE

• WHAT WE PROTECT

• WHAT IS BIG DATA/HISTORY

• BRIEF HISTORY

• USING BIG DATA

• COMMON CYBER ANALYTICS PLATFORM

• WHAT IS NEXT

People Systems Data

WHAT DO WE PROTECT? CNF Tech

SIDE NOTE

• Stop me if I speak too fast.

• I will try and answer questions at the end.

• I will stop for questions if you can’t wait till the end.

• I will try not to bore.

• And please.

• No tomatoes.

• Big Data is the process of examining large and varied data sets.

WHAT IS BIG DATA

Uncover Hidden Patterns Unknown Correlations Customer Preferences Make Better Informed Decisions

CIDDs

• Big Data Brief History

BIG DATA IN CYBER DEFENSE

• Collect large disparate data.

• Correlate, Visualize, Analyze.

• Normalize.

• Operationalize.

COLLECT - LEARN - ACT

USING BIG DATA IN CYBER DEFENSE

Healthcare.

Space Exploration.

Cyber Defense.

• Descriptive analytics.

• Diagnostic analytics.

• Predictive analytics.

• Prescriptive analytics.

Utilities.

BIG DATA USE CASES

BIG DATA CYBER DEFENSE MODEL

Prevent.

Detect.

Respond.

CYBER THREATS AND CHALLENGESSHORT FALLS & SUPPLEMENTATION

• Malware attacks increase in volume and complexity.

• Data volume.

• Scalability.

• Protecting sensitive and personal information.

• Data rights and ownership.

• No expertise to analyze the data.

BENEFITS OF BIG DATA OPERATIONALIZATION

• Detecting potential risk.

• Prevent, Detect and Respond.

• In-depth analysis creates insights.

• Operationalization capabilities respond automatically.

THE NEXT STEP

COMMON CYBER ANALYSIS PLATFORM

Nessus Vulnerability Data Metasploit Exploit Data

Backbone device logs

Server patch levels

IDS Sensor Information

Heuristic Data

ANSWERS IN BIG DATA

• What does an organization need to know to be security

aware?

• Affected, Vulnerable?

• Exposed, Exploitable?

• Patched?

• Under Attack?

• How can we use BIG DATA to answer these questions?

WHAT WE ARE LOOKING FOR

COMMON CYBER ANALYST PLATFORM

Near Real TimeAnalysis

• Monitor feeds

• Refined tuning

• Integrated

Workflows

• Sensor Events

• Forensic Data

• SEIM Relations

• Dashboards

• Correlation

• Reporting

• Normalizing

• Refined Correlation

• Specialized Feeds

• Automated Reports

• Collect

• Retain/Store

• Compliance

• Scanners

• Predictive Analysis

• Heuristics

• Advanced Analysis

• Fusion

In-depth Analysis Logs Sensors Data Analysis Alert Management

• Nessus

• Firewall

• Cisco

• Compliance

• Snort

• Fidelis

• Logger

• Splunk

• ELK

CYBER BIG DATA PROCESS

BIG DATA – WHAT IS NEXT

• Predictive analytics/machine learning with big data.

• Open Source dominance in big data technologies.

• Data is becoming the new oil.

• Chief Data Officers (CDOs) innovate driving value from data.

• Fast growing Internet of Things will result in even more data.

THE FUTURE

THANK YOUCNF Tech

I couldn't answer your questions

Please come meet me at our booth

Or Email me at: Andy.Pilato@cnftech.com

QUESTIONS?

top related