BIG DATA & CYBER DEFENSE ANDY PILATO, CHIEF TECHNOLOGY OFFICER (CTO)
BIG DATA & CYBER DEFENSE ANDY PILATO, CHIEF TECHNOLOGY OFFICER (CTO)
OUTLINE
• WHAT WE PROTECT
• WHAT IS BIG DATA/HISTORY
• BRIEF HISTORY
• USING BIG DATA
• COMMON CYBER ANALYTICS PLATFORM
• WHAT IS NEXT
People Systems Data
WHAT DO WE PROTECT? CNF Tech
SIDE NOTE
• Stop me if I speak too fast.
• I will try and answer questions at the end.
• I will stop for questions if you can’t wait till the end.
• I will try not to bore.
• And please.
• No tomatoes.
• Big Data is the process of examining large and varied data sets.
WHAT IS BIG DATA
Uncover Hidden Patterns Unknown Correlations Customer Preferences Make Better Informed Decisions
CIDDs
• Big Data Brief History
BIG DATA IN CYBER DEFENSE
• Collect large disparate data.
• Correlate, Visualize, Analyze.
• Normalize.
• Operationalize.
COLLECT - LEARN - ACT
USING BIG DATA IN CYBER DEFENSE
Healthcare.
Space Exploration.
Cyber Defense.
• Descriptive analytics.
• Diagnostic analytics.
• Predictive analytics.
• Prescriptive analytics.
Utilities.
BIG DATA USE CASES
BIG DATA CYBER DEFENSE MODEL
Prevent.
Detect.
Respond.
CYBER THREATS AND CHALLENGESSHORT FALLS & SUPPLEMENTATION
• Malware attacks increase in volume and complexity.
• Data volume.
• Scalability.
• Protecting sensitive and personal information.
• Data rights and ownership.
• No expertise to analyze the data.
BENEFITS OF BIG DATA OPERATIONALIZATION
• Detecting potential risk.
• Prevent, Detect and Respond.
• In-depth analysis creates insights.
• Operationalization capabilities respond automatically.
THE NEXT STEP
COMMON CYBER ANALYSIS PLATFORM
Nessus Vulnerability Data Metasploit Exploit Data
Backbone device logs
Server patch levels
IDS Sensor Information
Heuristic Data
ANSWERS IN BIG DATA
• What does an organization need to know to be security
aware?
• Affected, Vulnerable?
• Exposed, Exploitable?
• Patched?
• Under Attack?
• How can we use BIG DATA to answer these questions?
WHAT WE ARE LOOKING FOR
COMMON CYBER ANALYST PLATFORM
Near Real TimeAnalysis
• Monitor feeds
• Refined tuning
• Integrated
Workflows
• Sensor Events
• Forensic Data
• SEIM Relations
• Dashboards
• Correlation
• Reporting
• Normalizing
• Refined Correlation
• Specialized Feeds
• Automated Reports
• Collect
• Retain/Store
• Compliance
• Scanners
• Predictive Analysis
• Heuristics
• Advanced Analysis
• Fusion
In-depth Analysis Logs Sensors Data Analysis Alert Management
• Nessus
• Firewall
• Cisco
• Compliance
• Snort
• Fidelis
• Logger
• Splunk
• ELK
CYBER BIG DATA PROCESS
BIG DATA – WHAT IS NEXT
• Predictive analytics/machine learning with big data.
• Open Source dominance in big data technologies.
• Data is becoming the new oil.
• Chief Data Officers (CDOs) innovate driving value from data.
• Fast growing Internet of Things will result in even more data.
THE FUTURE
THANK YOUCNF Tech
I couldn't answer your questions
Please come meet me at our booth
Or Email me at: [email protected]
QUESTIONS?