INFORMATION STEWARDSHIP: AVOIDING DATA BREACHES AND MANAGING BIG DATA
|
|
- Arthur Summers
- 6 years ago
- Views:
Transcription
1 INFORMATION STEWARDSHIP: AVOIDING DATA BREACHES AND MANAGING BIG DATA Mike Small Session ID: GRC- T06 Session Classification: Intermediate
2 ABSTRACT Information security continues to be a problem and this problem is increasing because of the volume, velocity and variety associated with big data. Given the amount of attention to this area and the wealth of standards and technology available why do does this problem still exist? This presentation will look at the nature of information security risks and describe how better information stewardship based on information centric security is essential to manage these risks.
3 What is Information Worth? Some6mes it seems that the only people who value informa6on are those who want to steal it.
4 Anti-Terrorist Plans? Mistake Accidental Disclosure Britain's most senior antiterrorist policeman resigns. Telegraph.co.uk 9 th April 2009 Corner Cutting Carelessness
5 Medical Records? Misuse Abuse of privilege A record monetary penalty of 325,000 for a hospital: library/data_protection/notices/ bsuh_monetary_penalty_notice.ashx May 2012 Curiosity Negligence
6 Customer Data? Misuse Data theft Mobile phone customer contract renewal data stolen. Data_Protection/Notices/tmobile_summary.pdf December 2008 Disclosure Recklessness
7 Intellectual Property? Malice Open Letter to RSA Customers. March, 2011 Co-ordinated attacks Social Engineering Blackmail
8 More and More Data! Just as oil was likened to black gold, data takes on a new importance and value in the digital age. Neelie Kroes Vice- President of the European Commission responsible for the Digital Agenda December 2011
9 Big Data Explosion Volume According to IDC, 2.8ExaBytes (10 18 ) of data will have been created and replicated in 2012 Velocity LHC at CERN generates 600 million events per second Variety Text, voice, photo and video as well as instrumentation.
10 New Technologies Volume Velocity Variety Hadoop - MapReduce Elastic Map Reduce IBM InfoSphere Streams Twitter Storm Yahoo S4 NoSQL - databases Natural Language processing XML stores Graph stores
11 Smart Information Smart information is Big Data Analysed to create value Big Data Symbols without context processed or stored by a computer Smart Informa6on Big Data with interpreta6on and context that provides answers to ques6ons Millions of events in log files A pavern of events indica6ng fraudulent ac6vity
12 Big Data Risks and Threats Informa6on security risks for Big Data have similar root causes as for tradi6onal informa6on.
13 Big Data makes it harder! Big Data techniques make it harder to keep a secret Commoditization of techniques already used by intelligence agencies Inference drawn from many small pieces of data Big Data Techniques can also be used by the bad guys Facilitate Identity theft Refine exploits and malware Analyse data breaches
14 Top Big Data Challenges Insecure Infrastructure Secure distributed computing framework Improper Analysis Data provenance Assuring Compliance Trust in data sources Secure non SQL stores Granular access control Scalable Privacy Control access to multi level stores and logs Detect misuse and unauthorized access Auditing
15 Information Stewardship Taking care to look after property that is not your own is called stewardship
16 What is Information Stewardship? Information Lifecycle Security Business Value Information Stewardship Privacy and Compliance Data Architecture Information Quality Larry P. English, Improving Data Warehouse and Business Information Quality, John Wiley & Sons, 1999
17 Achieving Information Stewardship Informa6on stewardship uses good governance techniques to implement informa6on centric security.
18 Pillars of Information Stewardship Implement Information Governance Manage Information Lifecycle Information Security Culture Information Security Organization Understand Business need and implement best practice. Know what you have and control what happens to it Change the perception of security Everyone is responsible for information security
19 Information Governance Define Business Needs Get Executive Sponsorship Assess Current State/Define Action Plan Risk Assessment Classify Information and Data Organization and Culture Implement Best Practice Secure infrastructure and systems Monitor and improve
20 Information Lifecycle Own Acquire Delete Classical Data Classify Refine Big Data Analyse Access Create Use Discover
21 Security Culture Changing the percep6on of security Crea6ng Informa6on Stewardship Champions Educa6on, Teaching and Mentoring Rewards and Sanc6ons
22 Organization IT Functions IT Governance Stewardship Information Governance Business Functions Business Governance IT Management Organization & Culture Lines of Business Business Service Delivery Information Security Information Creation and Use
23 Information Centric Security IT organiza6ons have not been well connected to the business. This has led to lines of business bypassing the disciplines involved in securely delivering IT services.
24 Information Centric Security Security Objectives Supporting Processes Essential Elements Confidentiality, Integrity and Availability Policies, classification, access control, auditing Procedures and Technologies
25 Information Security Processes Classical Processes Big Data Processes Information Classification Access Policies and Controls Business Continuity Planning Auditing Data purpose, ownership and compliance Analysis verification, access control and disposal Big Data Auditing
26 Information Security Elements Classical Elements Identity and Access Management Privilege Management Secure Storage Flow Control Infrastructure Security Information Loss Resilience Monitoring and review Big Data Elements Data provenance verification Privilege Management Secure Big Data Storage Secure Big Data Flow Identity and Access Management Monitoring and review
27 Meeting the Challenges with Information Stewardship
28 Managing Classical Risks Data Centre Risks End User Device Risks Human Interface Risks Secure Storage Privilege Management Information Flow Control Infrastructure Security Identity and Access Management DLP Technology Mobile Device Management tools Culture Policies Training
29 Meeting Big Data Challenges Secured Infrastructure Verification Secured Analysis Provenance Verification Assured Compliance Defined purpose Change Control Secured data flows Informed consent Privilege management Access Governance Control of use Secured Storage Secured Disposal Auditing
30 Summary The con6nuing problem of data leakage, data loss and data they show that current approaches have proven inadequate. What is needed is bever informa6on stewardship
31 Summary New Challenges Big data, unstructured data, new technology threats Human Factors Informa6on Stewardship Informa6on Centric Security Malice, Misuse and Mistake Governance, culture, organiza6on Best prac6ce processes and technologies
32 Thank you! Mike Small
33 Information Sources #1 Cloud Security Alliance Top Ten Big Data Security and Privacy Challenges v1 ENISA ENISA Threat Landscape ( ) ENISA_Threat_Landscape/at_download/fullReport Larry P. English, Improving Data Warehouse and Business Information Quality, John Wiley & Sons,1999
34 Information Sources #2 ISACA Big Data: Impacts and Benefits Impacts-and-Benefits.aspx Creating a Culture of Security WCCS_Creating_a_Culture_of_Security_31Mar2011_Research.pdf Data Leak Prevention Prevention.aspx
35 Information Sources #2 KuppingerCole From Data Leakage Prevention (DLP) to Information Stewardship From Big Data to Smart Information Big Data and Information Stewardship
Optimizing Outcomes in a Connected World: Turning information into insights
Optimizing Outcomes in a Connected World: Turning information into insights Michael Eden Management Brand Executive Central & Eastern Europe Vilnius 18 October 2011 2011 IBM Corporation IBM celebrates
More information1. Understanding Big Data. Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. Understanding
More informationInformation Classification: Information Stewardship in Practice
KuppingerCole WHITEPAPER by Martin Kuppinger April 2013 Information Classification: Information Stewardship in Practice How classifying information helps improve Information Security. Finding the right
More informationLouis Bodine IBM STG WW BAO Tiger Team Leader
Louis Bodine IBM STG WW BAO Tiger Team Leader Presentation Objectives Discuss the value of Business Analytics Discuss BAO Ecosystem Discuss Transformational Solutions http://www.youtube.com/watch?v=eiuick5oqdm
More informationSmarter Analytics for Big Data
Smarter Analytics for Big Data Anjul Bhambhri IBM Vice President, Big Data February 27, 2011 The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT The resulting explosion of information
More informationFrom Information to Insight: The Big Value of Big Data. Faire Ann Co Marketing Manager, Information Management Software, ASEAN
From Information to Insight: The Big Value of Big Data Faire Ann Co Marketing Manager, Information Management Software, ASEAN The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT
More informationGDPR and Microsoft 365: Streamline your path to compliance
Streamline your path to compliance GDPR: an overview The General Data Protection Regulation (GDPR) is a new European Union (EU) privacy law that takes effect on May 25,. It is designed to give individuals
More informationCertified Identity Governance Expert (CIGE) Overview & Curriculum
Overview Identity and Access Governance (IAG) provides the link between Identity and Access Management (IAM) rules and the policies within a company to protect systems and data from unauthorized access,
More informationBetter Security More Often. How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission
How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission 1 Table of contents Privacy and Security Matter: You Decide How Much A Look Inside Sacramento County
More informationCOMP9321 Web Application Engineering
COMP9321 Web Application Engineering Semester 1, 2017 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 11 (Part II) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2457
More informationSupplier Security Directives
Page 1 (8) Supplier Directives 1 Description This document (the Directives ) describes the security requirements applicable to Suppliers (as defined below) and other identified business partners to Telia
More informationReady for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements
SAP Database and Data Management Portfolio/SAP GRC Solutions Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements
More informationMyths, good Bets, and Realities: Breaking the Health Digital Deadlock through Big Data and AI
Myths, good Bets, and Realities: Breaking the Health Digital Deadlock through Big Data and AI Silvia Piai, IDC HIMSS Impact 2017 IDC Are Healthcare Systems Stupid? In a lifetime, an average human will
More informationQuality Input Quality Output
Quality Input Quality Output IBM Healthcare Executive Dinner Michael Rochanakij Senior information Agenda Consultant Tonight s Topics Is the quality of information important? How well do we manage information?
More informationRSA. Sustaining Trust in the Digital World. Gintaras Pelenis
1 RSA Sustaining Trust in the Digital World Gintaras Pelenis +370 698 75456 Gintaras.pelenis@emc.com 2 IN 2011 THE DIGITAL UNIVERSE WILL SURPASS 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 3 $ 4 5 Advanced
More informationPORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD
PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD FOCUS MARKETS SAS Addressable Market Size $US Billions $14.7 2015 2019 $10.6 $9.6 $7.0 $7.9 $5.0 $2.6 $3.7 $5.7 $4.4 $3.0 $4.2 BUSINESS INTELLIGENCE
More informationIs Artificial Intelligence on your Board/Audit Committee s Agenda? Hossam El Shaffei, RSM Egypt
Is Artificial Intelligence on your Board/Audit Committee s Agenda? Hossam El Shaffei, RSM Egypt Is Artificial Intelligence on your Board/Audit Committee s Agenda? The difficult thing about Artificial Intelligence
More informationSmartCare. SPSS Workshop. Rick Durham - North American Advanced Analytics Channel Team IBM Corporation. Date: 5/28/2014
SPSS Workshop Key Presenter Rick Durham - North American Advanced Analytics Channel Team Date: 5/28/2014 Agenda What is Predictive Analytics? What is the architecture of the IBM/SPSS technology stack?
More informationDLT AnalyticsStack. Powering big data, analytics and data science strategies for government agencies
DLT Stack Powering big data, analytics and data science strategies for government agencies Now, government agencies can have a scalable reference model for success with Big Data, Advanced and Data Science
More informationActualTests.C Q&A C Foundations of IBM Big Data & Analytics Architecture V1
ActualTests.C2030-136.40Q&A Number: C2030-136 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ C2030-136 Foundations of IBM Big Data & Analytics Architecture V1 Hello,
More informationAccelerate GDPR compliance with the Microsoft Cloud Henrik Mønsted
Accelerate GDPR compliance with the Microsoft Cloud Henrik Mønsted Cloud Solutions Architect Microsoft Denmark This presentation is intended to provide an overview of GDPR and is not a definitive statement
More informationTHE FIRST THREE STEPS TO GETTING GDPR READY
THE FIRST THREE STEPS TO GETTING GDPR READY GDPR 25 MAY 2018 Agile Solutions is a specialist Information Management and Data Analytics consultancy. We provide applications, technology and support services
More informationSunnie Chung. Cleveland State University
Sunnie Chung Cleveland State University Data Scientist Big Data Processing Data Mining 2 INTERSECT of Computer Scientists and Statisticians with Knowledge of Data Mining AND Big data Processing Skills:
More informationInformation governance strategy
Information governance strategy January 2018 Version 1.0 NHS fraud. Spot it. Report it. Together we stop it. Version control Version Name Date Comment V 1.0 Trevor Duplessis 22/01/18 Due for review Dec
More informationThey re People Not Data! The Human Side of Insider Cyberthreats
SESSION ID: HUM-R03F They re People Not Data! The Human Side of Insider Cyberthreats Dawn M. Cappelli Vice President, Information Risk Management Rockwell Automation @DawnCappelli Susan Schmitt Senior
More informationIBM InfoSphere Guardium Data Redaction
IBM InfoSphere Guardium Data Redaction Document protection for regulatory compliance and risk reduction Highlights: Automatically recognize and remove sensitive data in unstructured documents, forms and
More informationMoving to the Cloud: Benefits, Risks & a Case Study What is this Cloud thing?
Moving to the Cloud: Benefits, Risks & a Case Study What is this Cloud thing? 1 Cloud Definition The cloud can mean different things to different people, usually dependent on their interaction with the
More informationCorporate Collaboration Meets Social Media. Sarah Carter, Vice President, Actiance, Inc.
Corporate Collaboration Meets Social Media Sarah Carter, Vice President, Actiance, Inc. Learn how to bring social media in line with other corporate communication tools Discover why enterprise communications
More informationPrivacy Compliance and Oversight in the National Security Context
Privacy Compliance and Oversight in the National Security Context John DeLong Director of Compliance National Security Agency Session ID: GRC-R33 Session Classification: Intermediate High-Level Privacy
More informationBanking in the Balance: Security vs. Convenience. IBM Trusteer s Valerie Bradford on How to Assess Digital Identities
Banking in the Balance: Security vs. Convenience IBM Trusteer s Valerie Bradford on How to Assess Digital Identities In an interview about overcoming these challenges, Bradford discusses: The fundamental
More informationInternal Audit (IA) for Social Media
Internal Audit (IA) for Discussion Document June 26, 2012 1 http://www.youtube.com/watch?v=0euel3n7fds Contents #Who we Are # Perspective # Benefits and Challenges 2 Our Capabilities in /Collaboration
More informationCognitive Data Warehouse and Analytics
Cognitive Data Warehouse and Analytics Hemant R. Suri, Sr. Offering Manager, Hybrid Data Warehouses, IBM (twitter @hemantrsuri or feel free to reach out to me via LinkedIN!) Over 90% of the world s data
More informationCS 5150 So(ware Engineering So(ware Development in Prac9ce
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering So(ware Development in Prac9ce William Y. Arms Overall Aim of the Course We assume that you are technically proficient. You
More information5th Annual. Cloudera, Inc. All rights reserved.
5th Annual 1 The Essentials of Apache Hadoop The What, Why and How to Meet Agency Objectives Sarah Sproehnle, Vice President, Customer Success 2 Introduction 3 What is Apache Hadoop? Hadoop is a software
More informationJason Virtue Business Intelligence Technical Professional
Jason Virtue Business Intelligence Technical Professional jvirtue@microsoft.com Agenda Microsoft Azure Data Services Azure Cloud Services Azure Machine Learning Azure Service Bus Azure Stream Analytics
More informationExternal Supplier Control Obligations. Information Security
External Supplier Control Obligations Information Security Version 8.0 March 2018 Control Area / Title Control Description Why this is important 1. Roles and Responsibilities The Supplier must define and
More informationTrust and Big Data. Lara Srivastava, PhD ITU-T Study Group 3 Counsellor Head, Bridging the Standardization Gap Programme (BSG), TSB/ITU
REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Ramada Plaza, Tunis, Tunisia, 26 July 2016 Trust and Big Data Lara Srivastava, PhD ITU-T Study Group 3 Counsellor Head, Bridging
More informationThe Boldon James SharePoint Security Challenges Survey
The Boldon James SharePoint Security Challenges Survey FINDINGS REPORT A Boldon James Commissioned Research Survey Microsoft Global Go-To-Market partner for Messaging in Defence and Public Safety Introduction
More informationFulfilling CDM Phase II with Identity Governance and Provisioning
SOLUTION BRIEF Fulfilling CDM Phase II with Identity Governance and Provisioning SailPoint has been selected as a trusted vendor by the Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring
More informationSOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
More informationSession 7: Some Big Data Challenges
Session 7: Some Big Data Challenges 2,500,000,000,000,000,000 Bytes (2.5 x 10 18 ) of data are created every day! (2012_ or 8,000,000,000,000,000,000 (7 exabytes) of new data were stored globally by enterprises
More informationEU General Data Protection Regulation
Steve Norledge, UKI GDPR Leader Sol Barron, Information Governance Specialist February 2017 EU General Data Protection Regulation Getting Started with GDPR GDPR significantly extends EU member-state data
More informationSAP Enterprise Threat Detection Overview & Roadmap. Martin Plummer, SAP SE November 2016
SAP Enterprise Threat Detection Overview & Roadmap Martin Plummer, SAP SE November 2016 Disclaimer The information in this document is confidential and proprietary to SAP and may not be disclosed without
More informationAPAC Big Data & Cloud Summit 2013
APAC Big Data & Cloud Summit 2013 Big Data Analytics & Hadoop Use Cases Eddie Toh Server Marketing Manager 21 August 2013 From the dawn of civilization until 2003, we humans created 5 Exabyte of information.
More informationTOP 6 SECURITY USE CASES
Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory page 1 SOLUTION BRIEF TOP 6 SECURITY USE CASES for Automated Asset Inventory Solution Brief: Top 6 Security Use Cases for Automated
More informationExternal Supplier Control Obligations. Information Security
External Supplier Control Obligations Information Security Version 7.0 December 2016 Control Area / Title Control Description Why this is important Roles and Responsibilities The Supplier must define and
More informationGuidelines for Information Asset Management: Roles and Responsibilities
Guidelines for Information Asset Management: Roles and Responsibilities Document Version: 1.0 Document Classification: Public Published Date: April 2017 P a g e 1 Contents 1. Overview:... 3 2. Audience...
More informationHarnessing the Power of Big Data to Transform Your Business Anjul Bhambhri VP, Big Data, Information Management, IBM
May, 2012 Harnessing the Power of Big Data to Transform Your Business Anjul Bhambhri VP, Big Data, Information Management, IBM 12+ TBs of tweet data every day 30 billion RFID tags today (1.3B in 2005)
More informationAmsterdam. (technical) Updates & demonstration. Robert Voermans Governance architect
(technical) Updates & demonstration Robert Voermans Governance architect Amsterdam Please note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
More informationERM: Risk Maps and Registers. Performing an ISO Risk Assessment
ERM: Risk Maps and Registers Performing an ISO 31000 Risk Assessment Agenda Following a Standard? Framework First Performing a Risk Assessment Assigning Risk Ownership Data Management Questions? Following
More informationBig Data The Big Story
Big Data The Big Story Jean-Pierre Dijcks Big Data Product Mangement 1 Agenda What is Big Data? Architecting Big Data Building Big Data Solutions Oracle Big Data Appliance and Big Data Connectors Customer
More informationMicrosoft Azure Essentials
Microsoft Azure Essentials Azure Essentials Track Summary Data Analytics Explore the Data Analytics services in Azure to help you analyze both structured and unstructured data. Azure can help with large,
More informationSupplier Ethical Expectations
Supplier Ethical Expectations Training for Suppliers and Their Employees Revision 9, 2017 Course ID 00016572 1 Overview 1. What Intel Expects of Intel Employees Intel s Code of Conduct Intel s Anti-corruption
More informationVelocity. Accelerating Analytic Innovation Teradata 2018 Teradata
Velocity Accelerating Analytic Innovation 1 2015 Teradata 2018 Teradata Agenda State of the CIO Office in 2018 Global Experience and Success Teradata Velocity Portfolio Tools, IP, and Accelerators 2 Velocity
More informationMALICIOUS INSIDER THREATS AND CONDUCT RISK
MALICIOUS INSIDER THREATS AND CONDUCT RISK Annie Searle University of Washington The Information School Puget Sound ISACA September 19, 2017 Annie s Background 15 years as co-founder and CEO of Delphi
More informationModernizing Your Data Warehouse with Azure
Modernizing Your Data Warehouse with Azure Big data. Small data. All data. Christian Coté S P O N S O R S The traditional BI Environment The traditional data warehouse data warehousing has reached the
More informationBig Data, Security and Privacy: The EHR Vendor View
Taking a step towards Big Data, Security and Privacy: proactive health + care The EHR Vendor View Bob Harmon, MD Physician Executive, Cerner Corporation Presented to Preventive Medicine 2016 Washington,
More informationSimplifying the Process of Uploading and Extracting Data from Apache Hadoop
Simplifying the Process of Uploading and Extracting Data from Apache Hadoop Rohit Bakhshi, Solution Architect, Hortonworks Jim Walker, Director Product Marketing, Talend Page 1 About Us Rohit Bakhshi Solution
More informationBIG DATA TRANSFORMS BUSINESS
BIG DATA TRANSFORMS BUSINESS Johannes Fellner November 7 th, 2012 1 IN 2000 THE WORLD GENERATED TWO EXABYTES OF NEW INFORMATION Sources: How Much Information? Peter Lyman and Hal Varian, UC Berkeley,.
More informationIdentity is Everything
Identity is Everything INCREASING CHALLENGES. INCREASING COMPLEXITY. Shadow IT and BYOD Regulatory pressures Hybrid environments spanning cloud, mobile, and on-premises Budget costs and pressures Copyright
More informationDigital Advertising Alliance of Canada. Application of Self-Regulatory Principles to the Mobile Environment
Digital Advertising Alliance of Canada Application of Self-Regulatory Principles to the Mobile Environment 2017 Contents 2 Overview...3 i Definitions...4 ii Transparency and Control for Cross-App Data...7
More informationSolution Overview : The IBM Government Industry Framework
Meng Tay Software Consultant IBM Vietnam Solution Overview : The IBM Government Industry Framework 2010 IBM Corporation Challenges governments face in this economic environment Reduce costs Virtualization
More informationSmart About Smart Devices: An Introduction to MobileIron
Smart About Smart Devices: An Introduction to MobileIron Agenda: Smartphones in the enterprise What are the core challenges? How does MobileIron address them? How does MobileIron work? (demo) Q&A / next
More informationManaging Insider Risk through Training & Culture. Sponsored by Experian Data Breach Resolution
Managing Insider Risk through Training & Culture Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report
More informationSAP Innovation Forum Portugal GDPR Compliance Program Focus Use Cases
SAP Innovation Forum Portugal GDPR Compliance Program Focus Use Cases Dr. Neil Patrick Director COE GRC & Security (EMEA) 10 th May 2017 2017 SAP AG. All rights reserved. Internal, Named Partner 1 2017
More informationMeasuring What Matters Lisa Young
SESSION ID: GRC-R05 Measuring What Matters www.cert.org/rsa/ Lisa Young Senior Engineer CERT-Software Engineering Institute-Carnegie Mellon University Notices Copyright 2016 Carnegie Mellon University
More informationCONTRIBUTOR GUIDELINES BIG DATA MADE SIMPLE. One source. Many perspectives. Powered by
One source. Many perspectives. WHO ARE WE? Big Data Made Simple (BDMS) is one of the leading Big Data analytics content portals today. Singapore-based big data startup, Crayon Data, it was launched in
More informationSession 30 Powerful Ways to Use Hadoop in your Healthcare Big Data Strategy
Session 30 Powerful Ways to Use Hadoop in your Healthcare Big Data Strategy Bryan Hinton Senior Vice President, Platform Engineering Health Catalyst Sean Stohl Senior Vice President, Product Development
More informationManaging Data Warehouse Growth in the New Era of Big Data
Managing Data Warehouse Growth in the New Era of Big Data Colin White President, BI Research December 5, 2012 Sponsor 2 Speakers Colin White President, BI Research Vineet Goel Product Manager, IBM InfoSphere
More information6 Ways To Protect Your Business From Data Breaches in 2017
6 Ways To Protect Your Business From Data Breaches in 2017 Alaskan-owned company providing Paper Shredding & Hard Drive Destruction Services. We serve all of Southcentral Alaska with professional, secure,
More informationSpotlight Sessions. Nik Rouda. Director of Product Marketing Cloudera, Inc. All rights reserved. 1
Spotlight Sessions Nik Rouda Director of Product Marketing Cloudera @nrouda Cloudera, Inc. All rights reserved. 1 Spotlight: Protecting Your Data Nik Rouda Product Marketing Cloudera, Inc. All rights reserved.
More informationCloudera Hadoop & Industrie 4.0 wohin mit dem Datenstrom?
Cloudera Hadoop & Industrie 4.0 wohin mit dem Datenstrom? Bernard Doering Regional Sales Director, Central Europe 1 Cloudera Hadoop Scalable Flexible Open Cost- EffecLve 2 2014 Cloudera, Inc. All rights
More informationLanguages, Systems and Paradigms for Big Data. Dario COLAZZO
Languages, Systems and Paradigms for Big Data Dario COLAZZO Plan Introduction to Big Data MapReduce Hadoop and its ecosystem, RDD et Spark Pig Latin & Hive Modalités de contrôle Projet : analytics via
More informationIntegrated Care Information Management Readiness. An IDC InfoBrief, Sponsored by Dell EMC October 2016
Integrated Care Information Management Readiness Dell EMC October 2016 Introduction Dell EMC asked IDC Health Insights to analyze the progress of digital transformation in the health industry in the U.K.
More informationSyllabus. CSC 142 Fundamentals of Information Systems
General Information Syllabus CSC 142 Fundamentals of Information Systems Date July 12th, 2018 Author April Devaux Department Computing Sciences Course Prefix CSC Course Number 142 Course Title Fundamentals
More informationWHITE PAPER EU General Data Protection Regulation Compliance
WHITE PAPER EU General Data Protection Regulation Compliance Table of Contents 1. SAP is ready for GDPR 04 1.1. Data Protection Processes 04 1.2. Data Protection Thresholds 05 1.3. Technical & Organizational
More informationWhat You Don t Know Will Eventually Hurt You The Evolving Role of Enterprise Risk Management (ERM) in Successful Organizations
What You Don t Know Will Eventually Hurt You The Evolving Role of Enterprise Risk (ERM) in Successful Organizations Jeff Owen Senior Consultant The Rochdale Group 1 Jeff Owen, Senior Consultant 16 years
More informationEmerging Technology and Security Update
Emerging Technology and Security Update Presented by, Cal Slemp Managing Director, New York, NY October 25, 2012 Speaker Presenter Cal Slemp Managing Director, New York Topic Emerging Technology and Security
More informationData. Does it Matter?
Data. Does it Matter? Jarut N. Cisco Systems Data & Analytics are Top of Mind in Every Industry Automotive Auto sensors reporting location, problems Communications Location-based advertising Consumer
More informationWelcome to this special series of Rational. Talks to You podcasts focusing on Innovate 2013, the IBM
IBM Podcast [ MUSIC ] Welcome to this special series of Rational Talks to You podcasts focusing on Innovate 2013, the IBM Technical Summit. I'm Kimberly Gist with IBM. Innovate 2013 is the premier conference
More informationInternal Control Awareness: Tips for Improving Business Practices
Internal Control Awareness: Tips for Improving Business Practices S U S A N H A C K E R I N T E R N A L A U D I T O R Agenda Understand the value of internal controls. Learn some basic principles and best
More informationMonetizing Data. Creating Wealth through Analytics Powered Digital Culture. Narayanan Ramanathan (NR) Chief Digital Officer & Global Head
Monetizing Data Creating Wealth through Analytics Powered Digital Culture Narayanan Ramanathan (NR) Chief Digital Officer & Global Head Restricted Circulation L&T Technology Services 2018 Exciting Facts
More informationMapR Pentaho Business Solutions
MapR Pentaho Business Solutions The Benefits of a Converged Platform to Big Data Integration Tom Scurlock Director, WW Alliances and Partners, MapR Key Takeaways 1. We focus on business values and business
More informationUsing Machine Learning and Analytics to Understand How MQ Impacts Your Business
Using Machine Learning and Analytics to Understand How MQ Impacts Your Business Nastel Technologies What We Do Monitoring Tracking Analytics OK! X Banking Finance B U S I N E S S A P P L I C AT I O N S
More informationAn Automated Cornerstone to Privacy & Industry Regulations; End-to-End: Researched Legal Requirements to Defensible Disposition
An Automated Cornerstone to Privacy & Industry Regulations; End-to-End: Researched Legal Requirements to Defensible Disposition Speakers Brian Aungst: Business Development Executive; Hewlett Packard Enterprise
More informationBusiness Analytics and Optimization An IBM Growth Priority
Business Analytics and Optimization An IBM Growth Priority Paul Fitzpatrick Director, WW Industry ISV Partners IBM ISV & Developer Relations Best Student Recognition Event July 6-8, 2011 EMEA IBM Innovation
More informationThis document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers,
This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, agents, vendors and sub-contractors). To help guide
More informationChanging The Business landscape SAS and Open Source, Better Together. Dr Mark Chia, Head of Advanced Analytics, SAS
Changing The Business landscape SAS and Open Source, Better Together Dr Mark Chia, Head of Advanced Analytics, SAS Agenda Introduction SAS Initiative for Open Source Demo Q & A Introduction The analytics
More informationSOLUTION BRIEF HELPING ADDRESS GDPR CHALLENGES WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE
HELPING ADDRESS GDPR CHALLENGES WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL ACROSS THE GLOBE The EU GDPR imposes interrelated obligations for organizations
More informationBig Data Platform Overview
Big Data Platform Overview Alex Hay (athay@us.ibm.com), Big Data CTP Meridee Lowry (meridee@us.ibm.com), Big Data CTP April 30 th, 2014 Big Data is a Concept Big Data 2 IBM Big Data and Analytics Offerings
More informationAccess, Transform, and Connect Data with SAP Data Services Software
SAP Brief SAP s for Enterprise Information Management SAP Data Services Access, Transform, and Connect Data with SAP Data Services Software SAP Brief Establish an enterprise data integration and data quality
More informationThe Age of Stewardship
The Age of Stewardship Welcome! We re together for 90 minutes During the presentation, there will be several Q & A s Email your comments and questions any time 2 Agenda 1. Imagine achieving a culture of
More informationOrganizations do not need a Big Data Strategy; they need a Business Strategy that incorporates Big Data
Organizations do not need a Big Data Strategy; they need a Business Strategy that incorporates Big Data BILL SCHMARZO, CTO, DELL EMC GLOBAL SERVICES UNIVERSITY SAN FRANCISCO, SCHOOL OF MANAGEMENT EXECUTIVE
More informationCopyright - Diyotta, Inc. - All Rights Reserved. Page 2
Page 2 Page 3 Page 4 Page 5 Humanizing Analytics Analytic Solutions that Provide Powerful Insights about Today s Healthcare Consumer to Manage Risk and Enable Engagement and Activation Industry Alignment
More informationContents at a Glance COPYRIGHTED MATERIAL. Introduction... 1 Part I: Getting Started with Big Data... 7
Contents at a Glance Introduction... 1 Part I: Getting Started with Big Data... 7 Chapter 1: Grasping the Fundamentals of Big Data...9 Chapter 2: Examining Big Data Types...25 Chapter 3: Old Meets New:
More informationMicrosoft Big Data. Solution Brief
Microsoft Big Data Solution Brief Contents Introduction... 2 The Microsoft Big Data Solution... 3 Key Benefits... 3 Immersive Insight, Wherever You Are... 3 Connecting with the World s Data... 3 Any Data,
More informationOIC LLC is our Oracle Partner name. It stands for Oracle Independent Consultants (OIC) LLC.
OIC FAQ This document contains some of our Frequently Asked Questions (FAQ). We also include links to Oracle resources, which may require you to log in Oracle Partner Network (OPN). All OIC Contractors
More informationHIPAA Compliance and Mistakes:
HIPAA Compliance and Mistakes: Let s just say what everyone is thinking: Trying to be compliant with the Health Insurance Portability and Accountability Act (HIPAA) is tough! At HIPAAgps, we get that.
More informationBy: Shrikant Gawande (Cloudera Certified )
By: Shrikant Gawande (Cloudera Certified ) What is Big Data? For every 30 mins, a airline jet collects 10 terabytes of sensor data (flying time) NYSE generates about one terabyte of new trade data per
More informationGoverning Big Data and Hadoop
Governing Big Data and Hadoop Philip Russom Senior Research Director for Data Management, TDWI October 11, 2016 Sponsor 2 Speakers Philip Russom Senior Research Director for Data Management, TDWI Jean-Michel
More information