Data Lakes & Leaks Erno Doorenspleet. IBM Security

Similar documents
Fabrizio Patriarca. Come creare valore dalla GDPR

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

IBM services and technology solutions for supporting GDPR program

IBM Security Guardium Analyzer

Oracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

Cyber Risks in the Boardroom Conference

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Cyber Security Updates and Trends Affecting the Real Estate Industry

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Altitude Software. Data Protection Heading 2018

Cybersecurity Auditing in an Unsecure World

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

Go mobile. Stay in control.

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

CloudSOC and Security.cloud for Microsoft Office 365

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Best Practices in Securing a Multicloud World

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

CyberArk Privileged Threat Analytics

Intro to Niara. no compromise behavioral analytics. Tomas Muliuolis HPE Aruba Baltics Lead

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Automated Context and Incident Response

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

The Dropbox Problem: It s Worse than You Think

Webcast title in Verdana Regular

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

2018 Edition. Security and Compliance for Office 365

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

IBM Future of Work Forum

with Advanced Protection

Attackers Process. Compromise the Root of the Domain Network: Active Directory

2017 Varonis Data Risk Report. 47% of organizations have at least 1,000 sensitive files open to every employee.

How to Secure Your Cloud with...a Cloud?

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

First Look Showcase. Expanding our prevention, detection and response solutions. Marco Rottigni Chief Technical Security Officer, Qualys, Inc.

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Big data privacy in Australia

Modern Database Architectures Demand Modern Data Security Measures

Run the business. Not the risks.

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

CipherCloud CASB+ Connector for ServiceNow

First Look Showcase. Expanding our prevention, detection and response solutions. Sumedh Thakar Chief Product Officer, Qualys, Inc.

Cloud Security Whitepaper

An ICS Whitepaper Choosing the Right Security Assessment

Security Audit What Why

Big Data Security Internal Threat Detection. The Critical Role of Machine Learning.

Choosing the Right Security Assessment

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

Lessons from the Human Immune System Gavin Hill, Director Threat Intelligence

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

locuz.com SOC Services

Mapping BeyondTrust Solutions to

Behavioral Analytics A Closer Look

ALTITUDE DOESN T MAKE YOU SAFE. Satcom Direct s Comprehensive Cyber Security Portfolio for Business Aviation

Recipe for a Breach: Uncontrolled Employee Access + Poor Security Habits Employee Security Habits Reveal Risky Imbalance

Part 1: Anatomy of an Insider Threat Attack

Enhanced Threat Detection, Investigation, and Response

Securing Your Most Sensitive Data

Cyber Attack: Is Your Business at Risk?

Guide to Cyber Security Compliance with GDPR

2018 THALES DATA THREAT REPORT

Traditional Security Solutions Have Reached Their Limit

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

2017 SaaS Security Study ABSTRACT

Encrypted Traffic Analytics

Securing global enterprise with innovation

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

2015 VORMETRIC INSIDER THREAT REPORT

Oracle Database Security Assessment Tool

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

From Russia With Love

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Cybersecurity The Evolving Landscape

Encrypted Traffic Security (ETS) White Paper

IMPLEMENTING A SOLUTION FOR ASSURING KEYS AND CERTIFICATES

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

VARONIS CASE STUDY. Kirton McConkie. A Financial Services Design And Distribution Firm

PEOPLE CENTRIC SECURITY THE NEW

IBM Cloud Internet Services: Optimizing security to protect your web applications

Virtual Machine Encryption Security & Compliance in the Cloud

Next Generation Authentication

Building a Resilient Security Posture for Effective Breach Prevention

Operationalizing the Three Principles of Advanced Threat Detection

Combating Cyber Risk in the Supply Chain

716 West Ave Austin, TX USA

Transcription:

Data Lakes & Leaks Erno Doorenspleet 1

Data Lakes Leaks 2

A Data Lake versus A Data Reservoir Data flows in naturally and just sits there Built to extract value from the data Data without Analytics is just a liability 3

Will it happen to me? Proving once again that nobody is immune to data breaches, identity management company OneLogin has seen customer details stolen. The firm, which essentially provides password management services for businesses, admitted that a "malicious actor" has taken details relating to its US customers. The attack took place on May 31 2017. "The threat actor was able to access database tables that contain information about users, apps, and various types of keys," the firm continues. Worryingly, it also says that whoever took the data may have been able to decrypt it. OneLogin has not said how many customers were impacted during the 4 incident. DaFont hack leads to theft of 699,000 font-hunters Font-sharing site DaFont was breached by a bored hacker in May. Usernames, email addresses, and hashed passwords of 699,000 user accounts were stolen in the breach. The passwords were so bad that more than 98 percent of the passwords were cracked. Leaked TSA documents reveal litany of airport's security lapses Documents leaked from a passwordless backup drive exposed thousands of documents relating to the TSA's activities at Stewart, an international airport about 60 miles north of Manhattan. One of the documents revealed how the airport's security screeners failed to check names against the government's "no-fly" list.

More Users More Data More Interactions = More Risk 5

IT S ALL BIG DATA: IOT, ANALYTICS, COGNITIVE, CLOUD 6

Is it Cool, Convenient, or Creepy? 7

13 in Fortune 1000 employees upload corporate data to cloud apps 8

Where is My Data Stored? 9

Internet of Things 40% of all data generated by 2020 will come from connected sensors Security is Key! 10

Data Privacy Regulations 11

Do we understand the risks created by Humans? 12

13

14

92% of developers agree with the statement that Security is going to be more an issue in the future 2016 IBM CORPORATION 15

A New Approach for SECURITY 16

Have a (good) Treasure Map 17

What you don t know can hurt you: Master your risk! Create early visibility into potential risks to sensitive data Analyze Uncover Identify specific, high-value business-sensitive data at risk from internal or external threats Build a comprehensive view (processes, procedure, compliance, ownership, etc.) of sensitive data Tegan Have the right conversations with IT, Security, and LOB teams to improve business processes and mitigate risk Act 18 Visualize

Monitor access and Protect data across the enterprise and beyond Discovery, classification, vulnerability assessment, entitlement management Encryption, masking, and redaction Data and file activity monitoring Dynamic blocking and masking, alerts, and quarantine Compliance automation and auditing ANALYTICS 19

A security immune system, integrated and intelligent Security Eco-System Threat Intelligence Endpoint Network SECURITY OPERATIONS AND RESPONSE Security Intelligence Fraud Protection Mobile INFORMATION RISK AND PROTECTION Identity and Access Management Data & Appsr Cloud Security 20

Data Lakes Leaks 21

Data Lakes & Leaks Erno Doorenspleet THANK YOU 22