INFORMATION STEWARDSHIP: AVOIDING DATA BREACHES AND MANAGING BIG DATA

Size: px
Start display at page:

Download "INFORMATION STEWARDSHIP: AVOIDING DATA BREACHES AND MANAGING BIG DATA"

Transcription

1 INFORMATION STEWARDSHIP: AVOIDING DATA BREACHES AND MANAGING BIG DATA Mike Small Session ID: GRC- T06 Session Classification: Intermediate

2 ABSTRACT Information security continues to be a problem and this problem is increasing because of the volume, velocity and variety associated with big data. Given the amount of attention to this area and the wealth of standards and technology available why do does this problem still exist? This presentation will look at the nature of information security risks and describe how better information stewardship based on information centric security is essential to manage these risks.

3 What is Information Worth? Some6mes it seems that the only people who value informa6on are those who want to steal it.

4 Anti-Terrorist Plans? Mistake Accidental Disclosure Britain's most senior antiterrorist policeman resigns. Telegraph.co.uk 9 th April 2009 Corner Cutting Carelessness

5 Medical Records? Misuse Abuse of privilege A record monetary penalty of 325,000 for a hospital: library/data_protection/notices/ bsuh_monetary_penalty_notice.ashx May 2012 Curiosity Negligence

6 Customer Data? Misuse Data theft Mobile phone customer contract renewal data stolen. Data_Protection/Notices/tmobile_summary.pdf December 2008 Disclosure Recklessness

7 Intellectual Property? Malice Open Letter to RSA Customers. March, 2011 Co-ordinated attacks Social Engineering Blackmail

8 More and More Data! Just as oil was likened to black gold, data takes on a new importance and value in the digital age. Neelie Kroes Vice- President of the European Commission responsible for the Digital Agenda December 2011

9 Big Data Explosion Volume According to IDC, 2.8ExaBytes (10 18 ) of data will have been created and replicated in 2012 Velocity LHC at CERN generates 600 million events per second Variety Text, voice, photo and video as well as instrumentation.

10 New Technologies Volume Velocity Variety Hadoop - MapReduce Elastic Map Reduce IBM InfoSphere Streams Twitter Storm Yahoo S4 NoSQL - databases Natural Language processing XML stores Graph stores

11 Smart Information Smart information is Big Data Analysed to create value Big Data Symbols without context processed or stored by a computer Smart Informa6on Big Data with interpreta6on and context that provides answers to ques6ons Millions of events in log files A pavern of events indica6ng fraudulent ac6vity

12 Big Data Risks and Threats Informa6on security risks for Big Data have similar root causes as for tradi6onal informa6on.

13 Big Data makes it harder! Big Data techniques make it harder to keep a secret Commoditization of techniques already used by intelligence agencies Inference drawn from many small pieces of data Big Data Techniques can also be used by the bad guys Facilitate Identity theft Refine exploits and malware Analyse data breaches

14 Top Big Data Challenges Insecure Infrastructure Secure distributed computing framework Improper Analysis Data provenance Assuring Compliance Trust in data sources Secure non SQL stores Granular access control Scalable Privacy Control access to multi level stores and logs Detect misuse and unauthorized access Auditing

15 Information Stewardship Taking care to look after property that is not your own is called stewardship

16 What is Information Stewardship? Information Lifecycle Security Business Value Information Stewardship Privacy and Compliance Data Architecture Information Quality Larry P. English, Improving Data Warehouse and Business Information Quality, John Wiley & Sons, 1999

17 Achieving Information Stewardship Informa6on stewardship uses good governance techniques to implement informa6on centric security.

18 Pillars of Information Stewardship Implement Information Governance Manage Information Lifecycle Information Security Culture Information Security Organization Understand Business need and implement best practice. Know what you have and control what happens to it Change the perception of security Everyone is responsible for information security

19 Information Governance Define Business Needs Get Executive Sponsorship Assess Current State/Define Action Plan Risk Assessment Classify Information and Data Organization and Culture Implement Best Practice Secure infrastructure and systems Monitor and improve

20 Information Lifecycle Own Acquire Delete Classical Data Classify Refine Big Data Analyse Access Create Use Discover

21 Security Culture Changing the percep6on of security Crea6ng Informa6on Stewardship Champions Educa6on, Teaching and Mentoring Rewards and Sanc6ons

22 Organization IT Functions IT Governance Stewardship Information Governance Business Functions Business Governance IT Management Organization & Culture Lines of Business Business Service Delivery Information Security Information Creation and Use

23 Information Centric Security IT organiza6ons have not been well connected to the business. This has led to lines of business bypassing the disciplines involved in securely delivering IT services.

24 Information Centric Security Security Objectives Supporting Processes Essential Elements Confidentiality, Integrity and Availability Policies, classification, access control, auditing Procedures and Technologies

25 Information Security Processes Classical Processes Big Data Processes Information Classification Access Policies and Controls Business Continuity Planning Auditing Data purpose, ownership and compliance Analysis verification, access control and disposal Big Data Auditing

26 Information Security Elements Classical Elements Identity and Access Management Privilege Management Secure Storage Flow Control Infrastructure Security Information Loss Resilience Monitoring and review Big Data Elements Data provenance verification Privilege Management Secure Big Data Storage Secure Big Data Flow Identity and Access Management Monitoring and review

27 Meeting the Challenges with Information Stewardship

28 Managing Classical Risks Data Centre Risks End User Device Risks Human Interface Risks Secure Storage Privilege Management Information Flow Control Infrastructure Security Identity and Access Management DLP Technology Mobile Device Management tools Culture Policies Training

29 Meeting Big Data Challenges Secured Infrastructure Verification Secured Analysis Provenance Verification Assured Compliance Defined purpose Change Control Secured data flows Informed consent Privilege management Access Governance Control of use Secured Storage Secured Disposal Auditing

30 Summary The con6nuing problem of data leakage, data loss and data they show that current approaches have proven inadequate. What is needed is bever informa6on stewardship

31 Summary New Challenges Big data, unstructured data, new technology threats Human Factors Informa6on Stewardship Informa6on Centric Security Malice, Misuse and Mistake Governance, culture, organiza6on Best prac6ce processes and technologies

32 Thank you! Mike Small

33 Information Sources #1 Cloud Security Alliance Top Ten Big Data Security and Privacy Challenges v1 ENISA ENISA Threat Landscape ( ) ENISA_Threat_Landscape/at_download/fullReport Larry P. English, Improving Data Warehouse and Business Information Quality, John Wiley & Sons,1999

34 Information Sources #2 ISACA Big Data: Impacts and Benefits Impacts-and-Benefits.aspx Creating a Culture of Security WCCS_Creating_a_Culture_of_Security_31Mar2011_Research.pdf Data Leak Prevention Prevention.aspx

35 Information Sources #2 KuppingerCole From Data Leakage Prevention (DLP) to Information Stewardship From Big Data to Smart Information Big Data and Information Stewardship

Optimizing Outcomes in a Connected World: Turning information into insights

Optimizing Outcomes in a Connected World: Turning information into insights Optimizing Outcomes in a Connected World: Turning information into insights Michael Eden Management Brand Executive Central & Eastern Europe Vilnius 18 October 2011 2011 IBM Corporation IBM celebrates

More information

1. Understanding Big Data. Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview

1. Understanding Big Data. Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. Understanding

More information

Information Classification: Information Stewardship in Practice

Information Classification: Information Stewardship in Practice KuppingerCole WHITEPAPER by Martin Kuppinger April 2013 Information Classification: Information Stewardship in Practice How classifying information helps improve Information Security. Finding the right

More information

Louis Bodine IBM STG WW BAO Tiger Team Leader

Louis Bodine IBM STG WW BAO Tiger Team Leader Louis Bodine IBM STG WW BAO Tiger Team Leader Presentation Objectives Discuss the value of Business Analytics Discuss BAO Ecosystem Discuss Transformational Solutions http://www.youtube.com/watch?v=eiuick5oqdm

More information

Smarter Analytics for Big Data

Smarter Analytics for Big Data Smarter Analytics for Big Data Anjul Bhambhri IBM Vice President, Big Data February 27, 2011 The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT The resulting explosion of information

More information

From Information to Insight: The Big Value of Big Data. Faire Ann Co Marketing Manager, Information Management Software, ASEAN

From Information to Insight: The Big Value of Big Data. Faire Ann Co Marketing Manager, Information Management Software, ASEAN From Information to Insight: The Big Value of Big Data Faire Ann Co Marketing Manager, Information Management Software, ASEAN The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT

More information

GDPR and Microsoft 365: Streamline your path to compliance

GDPR and Microsoft 365: Streamline your path to compliance Streamline your path to compliance GDPR: an overview The General Data Protection Regulation (GDPR) is a new European Union (EU) privacy law that takes effect on May 25,. It is designed to give individuals

More information

Certified Identity Governance Expert (CIGE) Overview & Curriculum

Certified Identity Governance Expert (CIGE) Overview & Curriculum Overview Identity and Access Governance (IAG) provides the link between Identity and Access Management (IAM) rules and the policies within a company to protect systems and data from unauthorized access,

More information

Better Security More Often. How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission

Better Security More Often. How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission 1 Table of contents Privacy and Security Matter: You Decide How Much A Look Inside Sacramento County

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 1, 2017 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 11 (Part II) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2457

More information

Supplier Security Directives

Supplier Security Directives Page 1 (8) Supplier Directives 1 Description This document (the Directives ) describes the security requirements applicable to Suppliers (as defined below) and other identified business partners to Telia

More information

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements SAP Database and Data Management Portfolio/SAP GRC Solutions Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

More information

Myths, good Bets, and Realities: Breaking the Health Digital Deadlock through Big Data and AI

Myths, good Bets, and Realities: Breaking the Health Digital Deadlock through Big Data and AI Myths, good Bets, and Realities: Breaking the Health Digital Deadlock through Big Data and AI Silvia Piai, IDC HIMSS Impact 2017 IDC Are Healthcare Systems Stupid? In a lifetime, an average human will

More information

Quality Input Quality Output

Quality Input Quality Output Quality Input Quality Output IBM Healthcare Executive Dinner Michael Rochanakij Senior information Agenda Consultant Tonight s Topics Is the quality of information important? How well do we manage information?

More information

RSA. Sustaining Trust in the Digital World. Gintaras Pelenis

RSA. Sustaining Trust in the Digital World. Gintaras Pelenis 1 RSA Sustaining Trust in the Digital World Gintaras Pelenis +370 698 75456 Gintaras.pelenis@emc.com 2 IN 2011 THE DIGITAL UNIVERSE WILL SURPASS 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 3 $ 4 5 Advanced

More information

PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD

PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD FOCUS MARKETS SAS Addressable Market Size $US Billions $14.7 2015 2019 $10.6 $9.6 $7.0 $7.9 $5.0 $2.6 $3.7 $5.7 $4.4 $3.0 $4.2 BUSINESS INTELLIGENCE

More information

Is Artificial Intelligence on your Board/Audit Committee s Agenda? Hossam El Shaffei, RSM Egypt

Is Artificial Intelligence on your Board/Audit Committee s Agenda? Hossam El Shaffei, RSM Egypt Is Artificial Intelligence on your Board/Audit Committee s Agenda? Hossam El Shaffei, RSM Egypt Is Artificial Intelligence on your Board/Audit Committee s Agenda? The difficult thing about Artificial Intelligence

More information

SmartCare. SPSS Workshop. Rick Durham - North American Advanced Analytics Channel Team IBM Corporation. Date: 5/28/2014

SmartCare. SPSS Workshop. Rick Durham - North American Advanced Analytics Channel Team IBM Corporation. Date: 5/28/2014 SPSS Workshop Key Presenter Rick Durham - North American Advanced Analytics Channel Team Date: 5/28/2014 Agenda What is Predictive Analytics? What is the architecture of the IBM/SPSS technology stack?

More information

DLT AnalyticsStack. Powering big data, analytics and data science strategies for government agencies

DLT AnalyticsStack. Powering big data, analytics and data science strategies for government agencies DLT Stack Powering big data, analytics and data science strategies for government agencies Now, government agencies can have a scalable reference model for success with Big Data, Advanced and Data Science

More information

ActualTests.C Q&A C Foundations of IBM Big Data & Analytics Architecture V1

ActualTests.C Q&A C Foundations of IBM Big Data & Analytics Architecture V1 ActualTests.C2030-136.40Q&A Number: C2030-136 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ C2030-136 Foundations of IBM Big Data & Analytics Architecture V1 Hello,

More information

Accelerate GDPR compliance with the Microsoft Cloud Henrik Mønsted

Accelerate GDPR compliance with the Microsoft Cloud Henrik Mønsted Accelerate GDPR compliance with the Microsoft Cloud Henrik Mønsted Cloud Solutions Architect Microsoft Denmark This presentation is intended to provide an overview of GDPR and is not a definitive statement

More information

THE FIRST THREE STEPS TO GETTING GDPR READY

THE FIRST THREE STEPS TO GETTING GDPR READY THE FIRST THREE STEPS TO GETTING GDPR READY GDPR 25 MAY 2018 Agile Solutions is a specialist Information Management and Data Analytics consultancy. We provide applications, technology and support services

More information

Sunnie Chung. Cleveland State University

Sunnie Chung. Cleveland State University Sunnie Chung Cleveland State University Data Scientist Big Data Processing Data Mining 2 INTERSECT of Computer Scientists and Statisticians with Knowledge of Data Mining AND Big data Processing Skills:

More information

Information governance strategy

Information governance strategy Information governance strategy January 2018 Version 1.0 NHS fraud. Spot it. Report it. Together we stop it. Version control Version Name Date Comment V 1.0 Trevor Duplessis 22/01/18 Due for review Dec

More information

They re People Not Data! The Human Side of Insider Cyberthreats

They re People Not Data! The Human Side of Insider Cyberthreats SESSION ID: HUM-R03F They re People Not Data! The Human Side of Insider Cyberthreats Dawn M. Cappelli Vice President, Information Risk Management Rockwell Automation @DawnCappelli Susan Schmitt Senior

More information

IBM InfoSphere Guardium Data Redaction

IBM InfoSphere Guardium Data Redaction IBM InfoSphere Guardium Data Redaction Document protection for regulatory compliance and risk reduction Highlights: Automatically recognize and remove sensitive data in unstructured documents, forms and

More information

Moving to the Cloud: Benefits, Risks & a Case Study What is this Cloud thing?

Moving to the Cloud: Benefits, Risks & a Case Study What is this Cloud thing? Moving to the Cloud: Benefits, Risks & a Case Study What is this Cloud thing? 1 Cloud Definition The cloud can mean different things to different people, usually dependent on their interaction with the

More information

Corporate Collaboration Meets Social Media. Sarah Carter, Vice President, Actiance, Inc.

Corporate Collaboration Meets Social Media. Sarah Carter, Vice President, Actiance, Inc. Corporate Collaboration Meets Social Media Sarah Carter, Vice President, Actiance, Inc. Learn how to bring social media in line with other corporate communication tools Discover why enterprise communications

More information

Privacy Compliance and Oversight in the National Security Context

Privacy Compliance and Oversight in the National Security Context Privacy Compliance and Oversight in the National Security Context John DeLong Director of Compliance National Security Agency Session ID: GRC-R33 Session Classification: Intermediate High-Level Privacy

More information

Banking in the Balance: Security vs. Convenience. IBM Trusteer s Valerie Bradford on How to Assess Digital Identities

Banking in the Balance: Security vs. Convenience. IBM Trusteer s Valerie Bradford on How to Assess Digital Identities Banking in the Balance: Security vs. Convenience IBM Trusteer s Valerie Bradford on How to Assess Digital Identities In an interview about overcoming these challenges, Bradford discusses: The fundamental

More information

Internal Audit (IA) for Social Media

Internal Audit (IA) for Social Media Internal Audit (IA) for Discussion Document June 26, 2012 1 http://www.youtube.com/watch?v=0euel3n7fds Contents #Who we Are # Perspective # Benefits and Challenges 2 Our Capabilities in /Collaboration

More information

Cognitive Data Warehouse and Analytics

Cognitive Data Warehouse and Analytics Cognitive Data Warehouse and Analytics Hemant R. Suri, Sr. Offering Manager, Hybrid Data Warehouses, IBM (twitter @hemantrsuri or feel free to reach out to me via LinkedIN!) Over 90% of the world s data

More information

CS 5150 So(ware Engineering So(ware Development in Prac9ce

CS 5150 So(ware Engineering So(ware Development in Prac9ce Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering So(ware Development in Prac9ce William Y. Arms Overall Aim of the Course We assume that you are technically proficient. You

More information

5th Annual. Cloudera, Inc. All rights reserved.

5th Annual. Cloudera, Inc. All rights reserved. 5th Annual 1 The Essentials of Apache Hadoop The What, Why and How to Meet Agency Objectives Sarah Sproehnle, Vice President, Customer Success 2 Introduction 3 What is Apache Hadoop? Hadoop is a software

More information

Jason Virtue Business Intelligence Technical Professional

Jason Virtue Business Intelligence Technical Professional Jason Virtue Business Intelligence Technical Professional jvirtue@microsoft.com Agenda Microsoft Azure Data Services Azure Cloud Services Azure Machine Learning Azure Service Bus Azure Stream Analytics

More information

External Supplier Control Obligations. Information Security

External Supplier Control Obligations. Information Security External Supplier Control Obligations Information Security Version 8.0 March 2018 Control Area / Title Control Description Why this is important 1. Roles and Responsibilities The Supplier must define and

More information

Trust and Big Data. Lara Srivastava, PhD ITU-T Study Group 3 Counsellor Head, Bridging the Standardization Gap Programme (BSG), TSB/ITU

Trust and Big Data. Lara Srivastava, PhD ITU-T Study Group 3 Counsellor Head, Bridging the Standardization Gap Programme (BSG), TSB/ITU REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Ramada Plaza, Tunis, Tunisia, 26 July 2016 Trust and Big Data Lara Srivastava, PhD ITU-T Study Group 3 Counsellor Head, Bridging

More information

The Boldon James SharePoint Security Challenges Survey

The Boldon James SharePoint Security Challenges Survey The Boldon James SharePoint Security Challenges Survey FINDINGS REPORT A Boldon James Commissioned Research Survey Microsoft Global Go-To-Market partner for Messaging in Defence and Public Safety Introduction

More information

Fulfilling CDM Phase II with Identity Governance and Provisioning

Fulfilling CDM Phase II with Identity Governance and Provisioning SOLUTION BRIEF Fulfilling CDM Phase II with Identity Governance and Provisioning SailPoint has been selected as a trusted vendor by the Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring

More information

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy? SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business

More information

Session 7: Some Big Data Challenges

Session 7: Some Big Data Challenges Session 7: Some Big Data Challenges 2,500,000,000,000,000,000 Bytes (2.5 x 10 18 ) of data are created every day! (2012_ or 8,000,000,000,000,000,000 (7 exabytes) of new data were stored globally by enterprises

More information

EU General Data Protection Regulation

EU General Data Protection Regulation Steve Norledge, UKI GDPR Leader Sol Barron, Information Governance Specialist February 2017 EU General Data Protection Regulation Getting Started with GDPR GDPR significantly extends EU member-state data

More information

SAP Enterprise Threat Detection Overview & Roadmap. Martin Plummer, SAP SE November 2016

SAP Enterprise Threat Detection Overview & Roadmap. Martin Plummer, SAP SE November 2016 SAP Enterprise Threat Detection Overview & Roadmap Martin Plummer, SAP SE November 2016 Disclaimer The information in this document is confidential and proprietary to SAP and may not be disclosed without

More information

APAC Big Data & Cloud Summit 2013

APAC Big Data & Cloud Summit 2013 APAC Big Data & Cloud Summit 2013 Big Data Analytics & Hadoop Use Cases Eddie Toh Server Marketing Manager 21 August 2013 From the dawn of civilization until 2003, we humans created 5 Exabyte of information.

More information

TOP 6 SECURITY USE CASES

TOP 6 SECURITY USE CASES Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory page 1 SOLUTION BRIEF TOP 6 SECURITY USE CASES for Automated Asset Inventory Solution Brief: Top 6 Security Use Cases for Automated

More information

External Supplier Control Obligations. Information Security

External Supplier Control Obligations. Information Security External Supplier Control Obligations Information Security Version 7.0 December 2016 Control Area / Title Control Description Why this is important Roles and Responsibilities The Supplier must define and

More information

Guidelines for Information Asset Management: Roles and Responsibilities

Guidelines for Information Asset Management: Roles and Responsibilities Guidelines for Information Asset Management: Roles and Responsibilities Document Version: 1.0 Document Classification: Public Published Date: April 2017 P a g e 1 Contents 1. Overview:... 3 2. Audience...

More information

Harnessing the Power of Big Data to Transform Your Business Anjul Bhambhri VP, Big Data, Information Management, IBM

Harnessing the Power of Big Data to Transform Your Business Anjul Bhambhri VP, Big Data, Information Management, IBM May, 2012 Harnessing the Power of Big Data to Transform Your Business Anjul Bhambhri VP, Big Data, Information Management, IBM 12+ TBs of tweet data every day 30 billion RFID tags today (1.3B in 2005)

More information

Amsterdam. (technical) Updates & demonstration. Robert Voermans Governance architect

Amsterdam. (technical) Updates & demonstration. Robert Voermans Governance architect (technical) Updates & demonstration Robert Voermans Governance architect Amsterdam Please note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice

More information

ERM: Risk Maps and Registers. Performing an ISO Risk Assessment

ERM: Risk Maps and Registers. Performing an ISO Risk Assessment ERM: Risk Maps and Registers Performing an ISO 31000 Risk Assessment Agenda Following a Standard? Framework First Performing a Risk Assessment Assigning Risk Ownership Data Management Questions? Following

More information

Big Data The Big Story

Big Data The Big Story Big Data The Big Story Jean-Pierre Dijcks Big Data Product Mangement 1 Agenda What is Big Data? Architecting Big Data Building Big Data Solutions Oracle Big Data Appliance and Big Data Connectors Customer

More information

Microsoft Azure Essentials

Microsoft Azure Essentials Microsoft Azure Essentials Azure Essentials Track Summary Data Analytics Explore the Data Analytics services in Azure to help you analyze both structured and unstructured data. Azure can help with large,

More information

Supplier Ethical Expectations

Supplier Ethical Expectations Supplier Ethical Expectations Training for Suppliers and Their Employees Revision 9, 2017 Course ID 00016572 1 Overview 1. What Intel Expects of Intel Employees Intel s Code of Conduct Intel s Anti-corruption

More information

Velocity. Accelerating Analytic Innovation Teradata 2018 Teradata

Velocity. Accelerating Analytic Innovation Teradata 2018 Teradata Velocity Accelerating Analytic Innovation 1 2015 Teradata 2018 Teradata Agenda State of the CIO Office in 2018 Global Experience and Success Teradata Velocity Portfolio Tools, IP, and Accelerators 2 Velocity

More information

MALICIOUS INSIDER THREATS AND CONDUCT RISK

MALICIOUS INSIDER THREATS AND CONDUCT RISK MALICIOUS INSIDER THREATS AND CONDUCT RISK Annie Searle University of Washington The Information School Puget Sound ISACA September 19, 2017 Annie s Background 15 years as co-founder and CEO of Delphi

More information

Modernizing Your Data Warehouse with Azure

Modernizing Your Data Warehouse with Azure Modernizing Your Data Warehouse with Azure Big data. Small data. All data. Christian Coté S P O N S O R S The traditional BI Environment The traditional data warehouse data warehousing has reached the

More information

Big Data, Security and Privacy: The EHR Vendor View

Big Data, Security and Privacy: The EHR Vendor View Taking a step towards Big Data, Security and Privacy: proactive health + care The EHR Vendor View Bob Harmon, MD Physician Executive, Cerner Corporation Presented to Preventive Medicine 2016 Washington,

More information

Simplifying the Process of Uploading and Extracting Data from Apache Hadoop

Simplifying the Process of Uploading and Extracting Data from Apache Hadoop Simplifying the Process of Uploading and Extracting Data from Apache Hadoop Rohit Bakhshi, Solution Architect, Hortonworks Jim Walker, Director Product Marketing, Talend Page 1 About Us Rohit Bakhshi Solution

More information

BIG DATA TRANSFORMS BUSINESS

BIG DATA TRANSFORMS BUSINESS BIG DATA TRANSFORMS BUSINESS Johannes Fellner November 7 th, 2012 1 IN 2000 THE WORLD GENERATED TWO EXABYTES OF NEW INFORMATION Sources: How Much Information? Peter Lyman and Hal Varian, UC Berkeley,.

More information

Identity is Everything

Identity is Everything Identity is Everything INCREASING CHALLENGES. INCREASING COMPLEXITY. Shadow IT and BYOD Regulatory pressures Hybrid environments spanning cloud, mobile, and on-premises Budget costs and pressures Copyright

More information

Digital Advertising Alliance of Canada. Application of Self-Regulatory Principles to the Mobile Environment

Digital Advertising Alliance of Canada. Application of Self-Regulatory Principles to the Mobile Environment Digital Advertising Alliance of Canada Application of Self-Regulatory Principles to the Mobile Environment 2017 Contents 2 Overview...3 i Definitions...4 ii Transparency and Control for Cross-App Data...7

More information

Solution Overview : The IBM Government Industry Framework

Solution Overview : The IBM Government Industry Framework Meng Tay Software Consultant IBM Vietnam Solution Overview : The IBM Government Industry Framework 2010 IBM Corporation Challenges governments face in this economic environment Reduce costs Virtualization

More information

Smart About Smart Devices: An Introduction to MobileIron

Smart About Smart Devices: An Introduction to MobileIron Smart About Smart Devices: An Introduction to MobileIron Agenda: Smartphones in the enterprise What are the core challenges? How does MobileIron address them? How does MobileIron work? (demo) Q&A / next

More information

Managing Insider Risk through Training & Culture. Sponsored by Experian Data Breach Resolution

Managing Insider Risk through Training & Culture. Sponsored by Experian Data Breach Resolution Managing Insider Risk through Training & Culture Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

SAP Innovation Forum Portugal GDPR Compliance Program Focus Use Cases

SAP Innovation Forum Portugal GDPR Compliance Program Focus Use Cases SAP Innovation Forum Portugal GDPR Compliance Program Focus Use Cases Dr. Neil Patrick Director COE GRC & Security (EMEA) 10 th May 2017 2017 SAP AG. All rights reserved. Internal, Named Partner 1 2017

More information

Measuring What Matters Lisa Young

Measuring What Matters  Lisa Young SESSION ID: GRC-R05 Measuring What Matters www.cert.org/rsa/ Lisa Young Senior Engineer CERT-Software Engineering Institute-Carnegie Mellon University Notices Copyright 2016 Carnegie Mellon University

More information

CONTRIBUTOR GUIDELINES BIG DATA MADE SIMPLE. One source. Many perspectives. Powered by

CONTRIBUTOR GUIDELINES BIG DATA MADE SIMPLE. One source. Many perspectives. Powered by One source. Many perspectives. WHO ARE WE? Big Data Made Simple (BDMS) is one of the leading Big Data analytics content portals today. Singapore-based big data startup, Crayon Data, it was launched in

More information

Session 30 Powerful Ways to Use Hadoop in your Healthcare Big Data Strategy

Session 30 Powerful Ways to Use Hadoop in your Healthcare Big Data Strategy Session 30 Powerful Ways to Use Hadoop in your Healthcare Big Data Strategy Bryan Hinton Senior Vice President, Platform Engineering Health Catalyst Sean Stohl Senior Vice President, Product Development

More information

Managing Data Warehouse Growth in the New Era of Big Data

Managing Data Warehouse Growth in the New Era of Big Data Managing Data Warehouse Growth in the New Era of Big Data Colin White President, BI Research December 5, 2012 Sponsor 2 Speakers Colin White President, BI Research Vineet Goel Product Manager, IBM InfoSphere

More information

6 Ways To Protect Your Business From Data Breaches in 2017

6 Ways To Protect Your Business From Data Breaches in 2017 6 Ways To Protect Your Business From Data Breaches in 2017 Alaskan-owned company providing Paper Shredding & Hard Drive Destruction Services. We serve all of Southcentral Alaska with professional, secure,

More information

Spotlight Sessions. Nik Rouda. Director of Product Marketing Cloudera, Inc. All rights reserved. 1

Spotlight Sessions. Nik Rouda. Director of Product Marketing Cloudera, Inc. All rights reserved. 1 Spotlight Sessions Nik Rouda Director of Product Marketing Cloudera @nrouda Cloudera, Inc. All rights reserved. 1 Spotlight: Protecting Your Data Nik Rouda Product Marketing Cloudera, Inc. All rights reserved.

More information

Cloudera Hadoop & Industrie 4.0 wohin mit dem Datenstrom?

Cloudera Hadoop & Industrie 4.0 wohin mit dem Datenstrom? Cloudera Hadoop & Industrie 4.0 wohin mit dem Datenstrom? Bernard Doering Regional Sales Director, Central Europe 1 Cloudera Hadoop Scalable Flexible Open Cost- EffecLve 2 2014 Cloudera, Inc. All rights

More information

Languages, Systems and Paradigms for Big Data. Dario COLAZZO

Languages, Systems and Paradigms for Big Data. Dario COLAZZO Languages, Systems and Paradigms for Big Data Dario COLAZZO Plan Introduction to Big Data MapReduce Hadoop and its ecosystem, RDD et Spark Pig Latin & Hive Modalités de contrôle Projet : analytics via

More information

Integrated Care Information Management Readiness. An IDC InfoBrief, Sponsored by Dell EMC October 2016

Integrated Care Information Management Readiness. An IDC InfoBrief, Sponsored by Dell EMC October 2016 Integrated Care Information Management Readiness Dell EMC October 2016 Introduction Dell EMC asked IDC Health Insights to analyze the progress of digital transformation in the health industry in the U.K.

More information

Syllabus. CSC 142 Fundamentals of Information Systems

Syllabus. CSC 142 Fundamentals of Information Systems General Information Syllabus CSC 142 Fundamentals of Information Systems Date July 12th, 2018 Author April Devaux Department Computing Sciences Course Prefix CSC Course Number 142 Course Title Fundamentals

More information

WHITE PAPER EU General Data Protection Regulation Compliance

WHITE PAPER EU General Data Protection Regulation Compliance WHITE PAPER EU General Data Protection Regulation Compliance Table of Contents 1. SAP is ready for GDPR 04 1.1. Data Protection Processes 04 1.2. Data Protection Thresholds 05 1.3. Technical & Organizational

More information

What You Don t Know Will Eventually Hurt You The Evolving Role of Enterprise Risk Management (ERM) in Successful Organizations

What You Don t Know Will Eventually Hurt You The Evolving Role of Enterprise Risk Management (ERM) in Successful Organizations What You Don t Know Will Eventually Hurt You The Evolving Role of Enterprise Risk (ERM) in Successful Organizations Jeff Owen Senior Consultant The Rochdale Group 1 Jeff Owen, Senior Consultant 16 years

More information

Emerging Technology and Security Update

Emerging Technology and Security Update Emerging Technology and Security Update Presented by, Cal Slemp Managing Director, New York, NY October 25, 2012 Speaker Presenter Cal Slemp Managing Director, New York Topic Emerging Technology and Security

More information

Data. Does it Matter?

Data. Does it Matter? Data. Does it Matter? Jarut N. Cisco Systems Data & Analytics are Top of Mind in Every Industry Automotive Auto sensors reporting location, problems Communications Location-based advertising Consumer

More information

Welcome to this special series of Rational. Talks to You podcasts focusing on Innovate 2013, the IBM

Welcome to this special series of Rational. Talks to You podcasts focusing on Innovate 2013, the IBM IBM Podcast [ MUSIC ] Welcome to this special series of Rational Talks to You podcasts focusing on Innovate 2013, the IBM Technical Summit. I'm Kimberly Gist with IBM. Innovate 2013 is the premier conference

More information

Internal Control Awareness: Tips for Improving Business Practices

Internal Control Awareness: Tips for Improving Business Practices Internal Control Awareness: Tips for Improving Business Practices S U S A N H A C K E R I N T E R N A L A U D I T O R Agenda Understand the value of internal controls. Learn some basic principles and best

More information

Monetizing Data. Creating Wealth through Analytics Powered Digital Culture. Narayanan Ramanathan (NR) Chief Digital Officer & Global Head

Monetizing Data. Creating Wealth through Analytics Powered Digital Culture. Narayanan Ramanathan (NR) Chief Digital Officer & Global Head Monetizing Data Creating Wealth through Analytics Powered Digital Culture Narayanan Ramanathan (NR) Chief Digital Officer & Global Head Restricted Circulation L&T Technology Services 2018 Exciting Facts

More information

MapR Pentaho Business Solutions

MapR Pentaho Business Solutions MapR Pentaho Business Solutions The Benefits of a Converged Platform to Big Data Integration Tom Scurlock Director, WW Alliances and Partners, MapR Key Takeaways 1. We focus on business values and business

More information

Using Machine Learning and Analytics to Understand How MQ Impacts Your Business

Using Machine Learning and Analytics to Understand How MQ Impacts Your Business Using Machine Learning and Analytics to Understand How MQ Impacts Your Business Nastel Technologies What We Do Monitoring Tracking Analytics OK! X Banking Finance B U S I N E S S A P P L I C AT I O N S

More information

An Automated Cornerstone to Privacy & Industry Regulations; End-to-End: Researched Legal Requirements to Defensible Disposition

An Automated Cornerstone to Privacy & Industry Regulations; End-to-End: Researched Legal Requirements to Defensible Disposition An Automated Cornerstone to Privacy & Industry Regulations; End-to-End: Researched Legal Requirements to Defensible Disposition Speakers Brian Aungst: Business Development Executive; Hewlett Packard Enterprise

More information

Business Analytics and Optimization An IBM Growth Priority

Business Analytics and Optimization An IBM Growth Priority Business Analytics and Optimization An IBM Growth Priority Paul Fitzpatrick Director, WW Industry ISV Partners IBM ISV & Developer Relations Best Student Recognition Event July 6-8, 2011 EMEA IBM Innovation

More information

This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers,

This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, agents, vendors and sub-contractors). To help guide

More information

Changing The Business landscape SAS and Open Source, Better Together. Dr Mark Chia, Head of Advanced Analytics, SAS

Changing The Business landscape SAS and Open Source, Better Together. Dr Mark Chia, Head of Advanced Analytics, SAS Changing The Business landscape SAS and Open Source, Better Together Dr Mark Chia, Head of Advanced Analytics, SAS Agenda Introduction SAS Initiative for Open Source Demo Q & A Introduction The analytics

More information

SOLUTION BRIEF HELPING ADDRESS GDPR CHALLENGES WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

SOLUTION BRIEF HELPING ADDRESS GDPR CHALLENGES WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE HELPING ADDRESS GDPR CHALLENGES WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL ACROSS THE GLOBE The EU GDPR imposes interrelated obligations for organizations

More information

Big Data Platform Overview

Big Data Platform Overview Big Data Platform Overview Alex Hay (athay@us.ibm.com), Big Data CTP Meridee Lowry (meridee@us.ibm.com), Big Data CTP April 30 th, 2014 Big Data is a Concept Big Data 2 IBM Big Data and Analytics Offerings

More information

Access, Transform, and Connect Data with SAP Data Services Software

Access, Transform, and Connect Data with SAP Data Services Software SAP Brief SAP s for Enterprise Information Management SAP Data Services Access, Transform, and Connect Data with SAP Data Services Software SAP Brief Establish an enterprise data integration and data quality

More information

The Age of Stewardship

The Age of Stewardship The Age of Stewardship Welcome! We re together for 90 minutes During the presentation, there will be several Q & A s Email your comments and questions any time 2 Agenda 1. Imagine achieving a culture of

More information

Organizations do not need a Big Data Strategy; they need a Business Strategy that incorporates Big Data

Organizations do not need a Big Data Strategy; they need a Business Strategy that incorporates Big Data Organizations do not need a Big Data Strategy; they need a Business Strategy that incorporates Big Data BILL SCHMARZO, CTO, DELL EMC GLOBAL SERVICES UNIVERSITY SAN FRANCISCO, SCHOOL OF MANAGEMENT EXECUTIVE

More information

Copyright - Diyotta, Inc. - All Rights Reserved. Page 2

Copyright - Diyotta, Inc. - All Rights Reserved. Page 2 Page 2 Page 3 Page 4 Page 5 Humanizing Analytics Analytic Solutions that Provide Powerful Insights about Today s Healthcare Consumer to Manage Risk and Enable Engagement and Activation Industry Alignment

More information

Contents at a Glance COPYRIGHTED MATERIAL. Introduction... 1 Part I: Getting Started with Big Data... 7

Contents at a Glance COPYRIGHTED MATERIAL. Introduction... 1 Part I: Getting Started with Big Data... 7 Contents at a Glance Introduction... 1 Part I: Getting Started with Big Data... 7 Chapter 1: Grasping the Fundamentals of Big Data...9 Chapter 2: Examining Big Data Types...25 Chapter 3: Old Meets New:

More information

Microsoft Big Data. Solution Brief

Microsoft Big Data. Solution Brief Microsoft Big Data Solution Brief Contents Introduction... 2 The Microsoft Big Data Solution... 3 Key Benefits... 3 Immersive Insight, Wherever You Are... 3 Connecting with the World s Data... 3 Any Data,

More information

OIC LLC is our Oracle Partner name. It stands for Oracle Independent Consultants (OIC) LLC.

OIC LLC is our Oracle Partner name. It stands for Oracle Independent Consultants (OIC) LLC. OIC FAQ This document contains some of our Frequently Asked Questions (FAQ). We also include links to Oracle resources, which may require you to log in Oracle Partner Network (OPN). All OIC Contractors

More information

HIPAA Compliance and Mistakes:

HIPAA Compliance and Mistakes: HIPAA Compliance and Mistakes: Let s just say what everyone is thinking: Trying to be compliant with the Health Insurance Portability and Accountability Act (HIPAA) is tough! At HIPAAgps, we get that.

More information

By: Shrikant Gawande (Cloudera Certified )

By: Shrikant Gawande (Cloudera Certified ) By: Shrikant Gawande (Cloudera Certified ) What is Big Data? For every 30 mins, a airline jet collects 10 terabytes of sensor data (flying time) NYSE generates about one terabyte of new trade data per

More information

Governing Big Data and Hadoop

Governing Big Data and Hadoop Governing Big Data and Hadoop Philip Russom Senior Research Director for Data Management, TDWI October 11, 2016 Sponsor 2 Speakers Philip Russom Senior Research Director for Data Management, TDWI Jean-Michel

More information