© 2015 - All Rights Reserved. Mining Big Data for Fun, Fraud and Profit Vitaly Levin

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

CYBER & Product Liability & Professional Indemnity
Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Security for Today’s Threat Landscape Kat Pelak 1.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Securing Online Transactions with a Trusted Digital Identity Dave Steeves - Security Software Engineer Microsoft’s.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
The big Data security Analytics Era Is Here Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
1© Copyright 2014 EMC Corporation. All rights reserved. Kenny Pool Advisory Systems Engineer Third Platform Apps & EMC: Redefining IT & Helping Our Customers.
T Sponsors Kent Weare Integration MVP, Author API Management Part 1 – An Introduction to Azure API Management BizTalk Summit 2015 – London ExCeL London.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Dell Connected Security Solutions Simplify & unify.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Membership Marketing ARE YOU TARGETING THE RIGHT MEMBER? 1.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Tom O’Reilly, CTO - TEEAM, VCE DIGITAL BANKING SUCCESS THROUGH THE EMC FEDERATION.
The Changing World of Endpoint Protection
Bryce Gartner, icimo Unlock Your Data Keys to Data Driven Success.
Ali Alhamdan, PhD National Information Center Ministry of Interior
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Presidio Bank Business Online Banking Security Overview.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Stephen Daze Dom Herrick Entrepreneur in Residence and Visiting Professor uOttawa, Telfer School of Management Business Models.
The Future Started Yesterday… Rupert March Director, Platform & Developer Experience CEE Multi-Country Region.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
About IRP Commerce o Product division of o Software engineering company that built the IRP Commerce platform o Research division is based in Northern.
CHAPTER ONE INFORMATION SYSTEMS IN GLOBAL BUSINESS TODAY.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
The Network Imperative Facilitator’s Guide Presentation
Why and how I became an entrepreneur by Alexander Van Laer
What Is Enterprise Computing?
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Deployment Planning Services
Managed Services.
Welcome to.
Juniper Software-Defined Secure Network
Careers in Cyber Security
Accelerate GDPR compliance with Microsoft 365
Journey to Microsoft Secure Cloud
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Real-time protection for web sites and web apps against ATTACKS
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
© EIT, Author Gay Robertson, 2017
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Strong Security for Your Weak Link:
Adaptive Change Our Digital Journey ERION SERTI Head of IT Division.
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
How to address security, cost, IT and migration concerns
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
R.C. Giltner Services, Inc.
Information Protection
Security in SDR & cognitive radio
Securely run and grow your business
Microsoft Data Insights Summit
Security intelligence: solving the puzzle for actionable insight
Information Protection
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
IoT in Healthcare: Life or Death
Presentation transcript:

© All Rights Reserved. Mining Big Data for Fun, Fraud and Profit Vitaly Levin

“Data is the new Oil. Data is just like crude. It’s valuable, but if unrefined it cannot really be used.” – Clive Humby, DunnHumby 2 “We have for the first time an economy based on a key resource [Information] that is not only renewable, but self-generating. Running out of it is not a problem, but drowning in it is. – John Naisbitt

 Uber - the world’s largest taxi company, owns no vehicles.  Google - world’s largest media/advertising company, creates no content.  Alibaba - the most valuable retailer, has no inventory.  Airbnb - the world’s largest accommodation provider, owns no real estate.

 Attacker Capabilities  Time to Discovery Verizon Data Breach Investigations Report

Attack surface is increasing Sec teams are missing attacks Attack are more sophisticated Sec teams need to increase experience and efficiency Existing strategies and controls are failing Tools, processes and knowledge must adapt to new threats

No worries, I got this!

Where is security being forced to head:  Sharing of Intelligence - Vendors, CFI, etc…  Behaviour Based Detection ◦ Traditional and Non Traditional Sources  Non Signature based Malware Detection  Cameras for Networks  Cloud Security Apps  Mobile Devices  Two-Factor Authentication  Data level encryption and obfuscation

 Behavior based – data relationships not predetermined  Designed to analyze massive data sets  Incorporates learning to improve  Can analyze non-traditional data sources ◦ Intelligence, identity, network, Logs

 Insider Threats  Malware  Attacks  Potential Risks **BE AWARE – Logs might contain information you do not expect

Application of Intelligence to On-Line Banking and Portals -Two-Factor Authentication for high risk transaction -Data encryption from Storage to Client (browser/App)

Vitaly Levin