Soumettre la recherche
Mettre en ligne
Defense Intelligence & The Information Challenge
•
2 j'aime
•
634 vues
IBMGovernmentCA
Suivre
TRACK 1 A - The Big Data Imperative for Smarter Defence - Tim Paydos.pdf
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 22
Recommandé
Knowledge Management and Knowledge Sharing at DISA
Knowledge Management and Knowledge Sharing at DISA
Dee Moone
A model for reducing information security risks due to human error
A model for reducing information security risks due to human error
Anup Narayanan
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Anup Narayanan
Human Impact on Information Security - Computer Society of India Conference, ...
Human Impact on Information Security - Computer Society of India Conference, ...
Anup Narayanan
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
KrisValerio
Information Security Shake-Up
Information Security Shake-Up
EMC
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
Anup Narayanan
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE Presentation
Singlewire Software
Recommandé
Knowledge Management and Knowledge Sharing at DISA
Knowledge Management and Knowledge Sharing at DISA
Dee Moone
A model for reducing information security risks due to human error
A model for reducing information security risks due to human error
Anup Narayanan
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Anup Narayanan
Human Impact on Information Security - Computer Society of India Conference, ...
Human Impact on Information Security - Computer Society of India Conference, ...
Anup Narayanan
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
KrisValerio
Information Security Shake-Up
Information Security Shake-Up
EMC
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
Anup Narayanan
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE Presentation
Singlewire Software
CBI Threat Landscape Webinar
CBI Threat Landscape Webinar
Joseph Schorr
Key considerations
Key considerations
Everbridge, Inc.
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
IT Network marcus evans
Information governance in the Facebook Era
Information governance in the Facebook Era
John Mancini
How to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency Incidents
Everbridge, Inc.
Vol13 no2
Vol13 no2
fphart
Are You Ready for the Era of Big Data and Extreme Information Management?
Are You Ready for the Era of Big Data and Extreme Information Management?
John Mancini
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
Jesse Wilkins
What is an information professional?
What is an information professional?
John Mancini
White Paper - Operational Knowledge Management
White Paper - Operational Knowledge Management
Dan Elder, MS
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
John Mancini
Gmn full ad_mini-1
Gmn full ad_mini-1
James A. Morin
Social business and innovation
Social business and innovation
John Mancini
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
Hossam Hassanien
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Livingstone Advisory
Preparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CT
Everbridge, Inc.
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
Livingstone Advisory
Big data and the challenge of extreme information
Big data and the challenge of extreme information
John Mancini
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
wmetcalf
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information Protection
Symantec
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
Big Data for Defense and Security
Big Data for Defense and Security
EMC
Contenu connexe
Tendances
CBI Threat Landscape Webinar
CBI Threat Landscape Webinar
Joseph Schorr
Key considerations
Key considerations
Everbridge, Inc.
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
IT Network marcus evans
Information governance in the Facebook Era
Information governance in the Facebook Era
John Mancini
How to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency Incidents
Everbridge, Inc.
Vol13 no2
Vol13 no2
fphart
Are You Ready for the Era of Big Data and Extreme Information Management?
Are You Ready for the Era of Big Data and Extreme Information Management?
John Mancini
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
Jesse Wilkins
What is an information professional?
What is an information professional?
John Mancini
White Paper - Operational Knowledge Management
White Paper - Operational Knowledge Management
Dan Elder, MS
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
John Mancini
Gmn full ad_mini-1
Gmn full ad_mini-1
James A. Morin
Social business and innovation
Social business and innovation
John Mancini
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
Hossam Hassanien
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Livingstone Advisory
Preparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CT
Everbridge, Inc.
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
Livingstone Advisory
Big data and the challenge of extreme information
Big data and the challenge of extreme information
John Mancini
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
wmetcalf
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information Protection
Symantec
Tendances
(20)
CBI Threat Landscape Webinar
CBI Threat Landscape Webinar
Key considerations
Key considerations
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
Information governance in the Facebook Era
Information governance in the Facebook Era
How to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency Incidents
Vol13 no2
Vol13 no2
Are You Ready for the Era of Big Data and Extreme Information Management?
Are You Ready for the Era of Big Data and Extreme Information Management?
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
What is an information professional?
What is an information professional?
White Paper - Operational Knowledge Management
White Paper - Operational Knowledge Management
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
Gmn full ad_mini-1
Gmn full ad_mini-1
Social business and innovation
Social business and innovation
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Preparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CT
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
Big data and the challenge of extreme information
Big data and the challenge of extreme information
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information Protection
En vedette
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
Big Data for Defense and Security
Big Data for Defense and Security
EMC
Marketwired - Social Media in the Military: Mining & Monitoring
Marketwired - Social Media in the Military: Mining & Monitoring
Jim Delaney
Unveiling FATA a Visual Journey.
Unveiling FATA a Visual Journey.
SRSP
How the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S model
asafeiran
Structure is not organization
Structure is not organization
asafeiran
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
Mckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative Investments
asafeiran
Political Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and Future
Shahid Hussain Raja
Big Data and Advanced Analytics
Big Data and Advanced Analytics
McKinsey on Marketing & Sales
En vedette
(10)
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Big Data for Defense and Security
Big Data for Defense and Security
Marketwired - Social Media in the Military: Mining & Monitoring
Marketwired - Social Media in the Military: Mining & Monitoring
Unveiling FATA a Visual Journey.
Unveiling FATA a Visual Journey.
How the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S model
Structure is not organization
Structure is not organization
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Mckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative Investments
Political Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and Future
Big Data and Advanced Analytics
Big Data and Advanced Analytics
Similaire à Defense Intelligence & The Information Challenge
Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
HR Florida State Council, Inc.
Big Data Is Here - Now What?
Big Data Is Here - Now What?
Chris Selland
Information Security Intelligence
Information Security Intelligence
guest08b1e6
Presentation For IAC Federal Acquisition
Presentation For IAC Federal Acquisition
Kim Kobza
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
IBM Sverige
Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...
IBM Banking
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and Solutions
IBMGovernmentCA
Cep 23 Decisive Intelligence Briefing V1 2
Cep 23 Decisive Intelligence Briefing V1 2
Freddie McMahon
Information på agendaen
Information på agendaen
IBM Danmark
Why Traditional Intranets Fail Today's Knowledge Workers
Why Traditional Intranets Fail Today's Knowledge Workers
Tieto Corporation
Knowledge Management in the Department of Defense
Knowledge Management in the Department of Defense
joannhague
The Road to Business Agility
The Road to Business Agility
Srini Koushik
Outsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan Informatiestrategie
John Septer
SYMCAnnual
SYMCAnnual
finance40
The Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 Presentation
Merck
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to Know
John Mancini
Making Informed Decision
Making Informed Decision
euwebtc01
Making Informed Decision
Making Informed Decision
euwebsc01
Making Informed Decision
Making Informed Decision
euweben01
Ibm data governance framework
Ibm data governance framework
kaiyun7631
Similaire à Defense Intelligence & The Information Challenge
(20)
Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
Big Data Is Here - Now What?
Big Data Is Here - Now What?
Information Security Intelligence
Information Security Intelligence
Presentation For IAC Federal Acquisition
Presentation For IAC Federal Acquisition
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and Solutions
Cep 23 Decisive Intelligence Briefing V1 2
Cep 23 Decisive Intelligence Briefing V1 2
Information på agendaen
Information på agendaen
Why Traditional Intranets Fail Today's Knowledge Workers
Why Traditional Intranets Fail Today's Knowledge Workers
Knowledge Management in the Department of Defense
Knowledge Management in the Department of Defense
The Road to Business Agility
The Road to Business Agility
Outsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan Informatiestrategie
SYMCAnnual
SYMCAnnual
The Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 Presentation
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Making Informed Decision
Making Informed Decision
Making Informed Decision
Making Informed Decision
Making Informed Decision
Making Informed Decision
Ibm data governance framework
Ibm data governance framework
Plus de IBMGovernmentCA
Cge leadership summit ibm presentation public sector analytics
Cge leadership summit ibm presentation public sector analytics
IBMGovernmentCA
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
IBMGovernmentCA
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
IBMGovernmentCA
Security Intelligence
Security Intelligence
IBMGovernmentCA
Reputational Risk
Reputational Risk
IBMGovernmentCA
CEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of Change
IBMGovernmentCA
Overview of IBM Capabilities
Overview of IBM Capabilities
IBMGovernmentCA
Business Process Management
Business Process Management
IBMGovernmentCA
Smarter Computing Integrated Systems
Smarter Computing Integrated Systems
IBMGovernmentCA
Smarter Software for Smarter Governments
Smarter Software for Smarter Governments
IBMGovernmentCA
Perspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service Management
IBMGovernmentCA
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
IBMGovernmentCA
Improving Defence Program Execution
Improving Defence Program Execution
IBMGovernmentCA
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
IBMGovernmentCA
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
IBMGovernmentCA
Analytics for Smarter Defence
Analytics for Smarter Defence
IBMGovernmentCA
Keynote phaedra boinodiris serious games beyond training from process optim...
Keynote phaedra boinodiris serious games beyond training from process optim...
IBMGovernmentCA
Where Ideas Come From
Where Ideas Come From
IBMGovernmentCA
What Are The Chances
What Are The Chances
IBMGovernmentCA
Business Analytics for Government
Business Analytics for Government
IBMGovernmentCA
Plus de IBMGovernmentCA
(20)
Cge leadership summit ibm presentation public sector analytics
Cge leadership summit ibm presentation public sector analytics
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Security Intelligence
Security Intelligence
Reputational Risk
Reputational Risk
CEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of Change
Overview of IBM Capabilities
Overview of IBM Capabilities
Business Process Management
Business Process Management
Smarter Computing Integrated Systems
Smarter Computing Integrated Systems
Smarter Software for Smarter Governments
Smarter Software for Smarter Governments
Perspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service Management
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Improving Defence Program Execution
Improving Defence Program Execution
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Analytics for Smarter Defence
Analytics for Smarter Defence
Keynote phaedra boinodiris serious games beyond training from process optim...
Keynote phaedra boinodiris serious games beyond training from process optim...
Where Ideas Come From
Where Ideas Come From
What Are The Chances
What Are The Chances
Business Analytics for Government
Business Analytics for Government
Dernier
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Dernier
(20)
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Defense Intelligence & The Information Challenge
1.
Defense Intelligence &
The Information Challenge Tim Paydos Director, IBM Threat Prediction & Prevention 9 October 2012 1 © 2009 IBM Corporation
2.
“In our ever-changing
world, America's first line of defense is timely, accurate intelligence that is shared, integrated, analyzed and acted upon quickly and effectively.” - President Barack Obama, 1/7/10 This isn’t an Information Sharing Problem. Its an Information Management Problem. Information Sharing Is only one piece of the larger problem General Michael Hayden, Former Director CIA, Former Director NSA It is not just about sharing information. Its about making sense of it and exploiting it once we have it. There is too much information to identify that which is important. We need tools that tell us what’s important, and what is relevant. Juan Zarate, Deputy National Security Adviser for Combating Terrorism 2 © 2009 IBM Corporation © 2009 IBM Corporation
3.
Today’s Discussion If you
only remember four things Intensifying threat and policy pressures have pushed agencies to a 1 tipping point – they know they need to transform Agency leaders embrace this, are defining the new requirements, 2 and are demonstrating success Achieving transformation requires a broad set of capabilities, and a 3 combination of technology & expertise The experience and assets exist to help you define a strategy and 4 a roadmap to guide your transformation 3 © 2009 IBM Corporation FOR INTERNAL IBM USE ONLY
4.
Agency Leaders Telling
Us What They Need Trusted Information -- On Multiple Levels Insightful Comprehensive analytics to drive new meaning from your data Can I extract new Insight to make it all worthwhile? Governed & Secure Rules are in place and tools are deployed to limit visibility, secure sensitive information, and protect privacy Can I Trust My Partner and My Own Agency? Accurate & Complete Complex and disparate data transformed, cleansed, reconcile and delivered Can I Trust The Information? © 2009 IBM Corporation
5.
Military & Intelligence
Agency Challenges Leaders Often Stuck Between A Rock And A Hard Place Today’s intensifying challenges mandate a fresh approach to Traditional Approaches managing threat information have become obsolete Multiplication of threat types, and frequency Information is compartmentalized – lack of full with which they occur integration obscures visibility Threats are increasingly asymmetrical Query State limits ability to address complexity of threats Explosion in complexity of threat identification Inability to manage and search across an expanding Multi cultural nature of citizenry array of unstructured data sources Frequency of transaction/interactions Inability to link unstructured content with structured data and manage together Social Media and “Big Data” playing an increasingly important role Untimely – Sense & Respond vs. Predict & Act Transparency is clouding Out of context – lack of visual analysis, collaboration, and support/guidance once threat is Citizen, Policy Maker and Regulatory identified expectations and pressures are increasing 5 © 2009 IBM Corporation
6.
The Big Data
Challenge Is Only Making It Harder Big Data Is An Explosion In Volume, Variety & Velocity In 2008, we created 40 Exabytes – more than in all recorded history . Now we we create 2.5 Quintillion bytes, or 2.5 Exabytes of data each day — so much that 90% of the data in the world today has been created in the last two years alone. • For Every 5 Minutes In Realtime, 60 Hours Of Video Is Up-Loaded to You Tube • 12 terabytes of Tweets are created each day, providing insight into public sentiment Volume of Digital Data • 80% of all the data created daily is unstructured – videos, images, emails, and social media • Structured data now includes a massive range of sensors, click streams, log files, call records, transactions Variety of Information • 5 billion financial transactions occur every single day • There are 30,000 commercial air flights, accounting for 1,500,000 air passengers – every single day Velocity of Decision Making © 2009 IBM Corporation
7.
Smarter Agencies Leading
The Way Optimize decision making with actionable insights Aware Obstructed view Aligned Variety Fragmented Inability to predict of insight Lack Volume Inefficient access Volume VelocityVelocity Rigid Agile Variety Inability to predict Volume Velocity Inefficient access Skilled analytics experts Everyone Lack of insight Variety Velocity Distracted Focused Reactive Proactive © 2009 IBM Corporation 7
8.
Leading the Way
Government Leaders Moving to Address These Challenges Streamlined Information Sharing Western National 8 Law Enforcement Registry of Identities, Objects and Events Across Fed and Local Agencies Automated content extraction, entity Western National resolution and analysis from seized Child Predator Investigation Law Enforcement assets US Department of Connect the dots, predict and prevent Protecting the homeland Homeland Security threats US Department of Perpetual credentialing and vetting Insider Threat Defense across branches and bases Centralized Proactive enterprise data activity Screening Database monitoring & extrusion prevention Insider Threat © 2009 IBM Corporation
9.
Leading the Way
Government Leaders Moving to Address These Challenges State of The Art covert surveillance system National Border & Security based on Streams platform Realtime Information Sharing, Discovery & Crime Prediction & Prevention analysis National Borders & Security: Real time network intrusion detection, sub- Cyber Security millisecond analysis and response National Borders & Security: Real time threat detection & prevention through Big Data & Watson Threat Prediction & Prevention © 2009 IBM Corporation
10.
Leading the Way Maritime
Threat Intelligence 10 © 2009 IBM Corporation
11.
Leading the Way
Who is Talking to Whom Stream A Denoising & Social Conversation Pairing Speaker Detection Network Analysis A B Olivier Mihalis talks to talks to C D Ching-Yung Upendra Stream B talks to talks to Stream C E Deepak After denoising - Just-in-time - Just-in-time - Social network Stream D - Features: Volumetrics - Features: GSM domain - Fusion technique - Very high accuracy - High accuracy - Iterative method - Very low complexity - Moderate complexity - Robust to noise - Robust to noise © 2009 IBM Corporation
12.
Leading the Way
Department of Immigration and Citizenship (Australia) Challenges DIAC, Australia has embarked on a major transformation program to fix key identity issues : Siloed databases, little connectivity between sources Gaps and vulnerabilities in their existing implementation Inconsistent user, citizen, and immigrant identity verification techniques Receive 4 million Visa applications annually Solution Launched a four year program to transform existing systems using a Service Oriented Architecture (SOA) and implementing a client-centric organization by providing: Roles-based portals to case management personnel Single view of a person’ across all client data sources (over 150 million ‘person’ records) SOA transformation and integration of legacy environment Business Benefits United previously fragmented person’ data and improved processing time 20% Improved ‘person’ identity resolution resulted in significant reduction in false negatives and inappropriate actions being taken Dramatic cost savings from streamlining associated business processes 12 © 2009 IBM Corporation
13.
What We Have
Learned Big Data Requires A Different Approach – It Breaks The Traditional Analytics Model Traditional Approach Big Data Approach Business Users IT Determine what question Delivers a platform to enable to ask creative discovery IT Structures the data to Business answer that question Explores what questions could be asked Structured & Repeatable Analytics Iterative & Exploratory Analytics •Query Based -- Questions Drive Data •Autonomic -- Insight Drives Answers •Citizen Surveys – Push VS. •Citizen Sentiment – Pull •Monthly, Weekly, Daily •Persistent & Ad Hoc •Data At Rest •Data In Motion © 2009 IBM Corporation
14.
What We Have
Learned A New Approach Is Required – Smarter Analytics Supporting Big Data Advanced Analytic Applications – Integrate and manage the full breadth of data types, and at full volume scale – Gain Insight from Data In Motion, Versus Data At Rest – Apply advanced analytics to information in its native form – Visualize all available data for ad-hoc analysis – Development environment for building new Big Data Platform analytic applications Process and analyze any type of data – Workload optimization and scheduling – Security and Governance Accelerators © 2009 IBM Corporation
15.
What We Have
Learned A Complete Set of Capabilities Is Required To Address The Challenge © 2009 IBM Corporation
16.
What’s Required To
Bridge The Gap Establish, Govern, Manage & Deliver Information That You Can Trust IBM InfoSphere Information Server Unified Deployment Understand Cleanse Transform Deliver Discover, model, and Standardize, merge, Combine and Synchronize, virtualize govern information and correct information restructure information and move information structure and content for new uses Unified Metadata Management Parallel Processing Rich Connectivity to Applications, Data, and Content © 2009 IBM Corporation 16
17.
What’s Required To
Bridge The Gap And Monitor Continuously & In Real Time Traditional Approach: Native Logging • Lives within the silo – limits visibility • Ex Post Facto, insecure, costly, inaccurate • Can’t identify who and when data is accessed • Does not block unauthorized data-extrusion • Severe negative impact on database performance 4th Generation Enterprise Activity Monitoring Discovers and classifies sensitive data Lock down on who has access to what Identifies the specific person (IP address) who touched the data, how and when – tamper proof audit Provides separation of duties – access to DB functions does not grant the individual the right to see all sensitive information © 2009 IBM Corporation
18.
What’s Required To
Bridge The Gap Persistent Relationship Awareness & Rules of Visibility Queries & Data Flow Through The Same DATA “Smart” Channel Enterprise DATA Limited DATA Alerts sent to analyst proactively Restricted 18 © 2009 IBM Corporation
19.
What’s Required To
Bridge The Gap Persistent Relationship Awareness – IBM Identity Insight A highly-specialized Identity Analytics repository providing real-time detection of obvious and non-obvious relationships between people, organizations, events, and other identity types Addresses The Thorny Issues Of: •Realtime Discovery •Enterprise Amnesia - Continuous •Enterprise Brain Hemorrhage - Persistent •Complex and Expanding attribution •Degrees of Separation DATA •Extensibility •Complex event processing Linked to Identities •Information pedigree and audit trail of DATA merges/splits •Anonymization DATA 19 © 2009 IBM Corporation
20.
What’s Required To
Bridge The Gap Rules of Visibility – IBM Initiate Provides accurate, real-time access to entity, object and event data across disparate sources, systems and networks Relationship & Hierarchy Management Views Collaborative, Visual Data Stewardship Capabilities Data Security & Privacy Enterprise Search Capabilities Highly configurable/custom composite views Open integration options Dynamic implementation models Limited Data security & privacy Reporting and analytics Restricted 20 © 2009 IBM Corporation
21.
Taking it to
the Next Level with Advanced Business Analytics What is happening What could happen? Simulation How many, how often, where? What if How can we achieve these trends Language & the best outcome? continue? Sentiment What Optimisation Forecasting exactly is the problem? What will How can we achieve Structured Data What Are Made What happen next the best outcome and Extracting People & Unstructured consumable and actions are if? address variability? concepts and Predictive Stochastic Talking About Content accessible to relationships needed? & Feeling everyone Modelling Optimisation Descriptive Predictive Prescriptive Content Web Analytics Analytics Analytics Analytics Analytics 21 © 2009 IBM Corporation
22.
Today’s Discussion If you
only remember four things Intensifying threat and policy pressures have pushed agencies to a 1 tipping point – they know they need to transform Agency leaders embrace this, are defining the new requirements, 2 and are demonstrating success Achieving transformation requires a broad set of capabilities, and a 3 combination of technology & expertise The experience and assets exist to help you define a strategy and 4 a roadmap to guide your transformation 22 © 2009 IBM Corporation FOR INTERNAL IBM USE ONLY