SlideShare une entreprise Scribd logo
1  sur  22
Defense Intelligence & The Information Challenge




                            Tim Paydos
                            Director, IBM Threat Prediction & Prevention
                            9 October 2012




   1                                                         © 2009 IBM Corporation
“In our ever-changing world, America's first line of defense is timely, accurate
    intelligence that is shared, integrated, analyzed and acted upon quickly and effectively.”
                                                                  - President Barack Obama, 1/7/10




                          This isn’t an Information Sharing Problem. Its an Information
                          Management Problem. Information Sharing Is only one piece of
                          the larger problem
                               General Michael Hayden, Former Director CIA, Former Director NSA




    It is not just about sharing information. Its about making sense of it and exploiting it
    once we have it. There is too much information to identify that which is important. We
    need tools that tell us what’s important, and what is relevant.
                             Juan Zarate, Deputy National Security Adviser for Combating Terrorism

2



                                                                                    © 2009 IBM Corporation
                                                                                     © 2009 IBM Corporation
Today’s Discussion
If you only remember four things



        Intensifying threat and policy pressures have pushed agencies to a
    1   tipping point – they know they need to transform


        Agency leaders embrace this, are defining the new requirements,
    2   and are demonstrating success


        Achieving transformation requires a broad set of capabilities, and a
    3   combination of technology & expertise


        The experience and assets exist to help you define a strategy and
    4   a roadmap to guide your transformation




3                                                                           © 2009 IBM Corporation
                               FOR INTERNAL IBM USE ONLY
Agency Leaders Telling Us What They Need
Trusted Information -- On Multiple Levels




                                                                                 Insightful
                                                              Comprehensive analytics to drive
                                                                 new meaning from your data
                                              Can I extract new Insight to make it all worthwhile?

                                                                 Governed & Secure
                                    Rules are in place and tools are deployed to limit visibility,
                                             secure sensitive information, and protect privacy
                                                    Can I Trust My Partner and My Own Agency?


                                                              Accurate & Complete
                                         Complex and disparate data transformed, cleansed,
                                                                    reconcile and delivered
                                                                    Can I Trust The Information?




                                                                                   © 2009 IBM Corporation
Military & Intelligence Agency Challenges
 Leaders Often Stuck Between A Rock And A Hard Place

 Today’s intensifying challenges
  mandate a fresh approach to                             Traditional Approaches
  managing threat information                             have become obsolete

Multiplication of threat types, and frequency      Information is compartmentalized – lack of full
with which they occur                              integration obscures visibility
Threats are increasingly asymmetrical              Query State limits ability to address complexity of
                                                   threats
Explosion in complexity of threat identification
                                                   Inability to manage and search across an expanding
Multi cultural nature of citizenry                 array of unstructured data sources
Frequency of transaction/interactions              Inability to link unstructured content with structured
                                                   data and manage together
Social Media and “Big Data” playing an
increasingly important role                        Untimely – Sense & Respond vs. Predict & Act
Transparency is clouding                           Out of context – lack of visual analysis,
                                                   collaboration, and support/guidance once threat is
Citizen, Policy Maker and Regulatory               identified
expectations and pressures are increasing




 5                                                                                    © 2009 IBM Corporation
The Big Data Challenge Is Only Making It Harder
Big Data Is An Explosion In Volume, Variety & Velocity

In 2008, we created 40 Exabytes – more than in all recorded history . Now we we create
2.5 Quintillion bytes, or 2.5 Exabytes of data each day — so much that 90% of the data in
the world today has been created in the last two years alone.


                              • For Every 5 Minutes In Realtime, 60 Hours Of Video Is Up-Loaded to You
                                Tube
                              • 12 terabytes of Tweets are created each day, providing insight into public
                                sentiment
Volume of Digital Data
                              • 80% of all the data created daily is unstructured – videos, images, emails,
                                and social media
                              • Structured data now includes a massive range of sensors, click streams,
                                log files, call records, transactions


Variety of Information        • 5 billion financial transactions occur every single day
                              • There are 30,000 commercial air flights, accounting for 1,500,000 air
                                passengers – every single day




Velocity of Decision Making                                                                  © 2009 IBM Corporation
Smarter Agencies Leading The Way
       Optimize decision making with actionable insights




                                                                          Aware

                                                 Obstructed view
                                                                         Aligned
                     Variety
                                                   Fragmented
           Inability to predict of insight
                   Lack
             Volume
Inefficient access Volume
              VelocityVelocity                        Rigid
                                                                           Agile
                      Variety
                Inability to predict
                         Volume
                  Velocity
           Inefficient access                Skilled analytics experts
                                                                         Everyone
      Lack of insight
                        Variety
                 Velocity                           Distracted
                                                                         Focused
                                                     Reactive

                                                                         Proactive


                                                                                     © 2009 IBM Corporation
       7
Leading the Way
  Government Leaders Moving to Address These Challenges


Streamlined Information Sharing   Western National
        8                         Law Enforcement     Registry of Identities, Objects and Events
Across Fed and Local Agencies


                                                      Automated content extraction, entity
                                  Western National    resolution and analysis from seized
Child Predator Investigation      Law Enforcement
                                                      assets



                                  US Department of    Connect the dots, predict and prevent
Protecting the homeland           Homeland Security   threats



                                  US Department of    Perpetual credentialing and vetting
Insider Threat                        Defense         across branches and bases



                                      Centralized    Proactive enterprise data activity
                                  Screening Database monitoring & extrusion prevention
Insider Threat

                                                                                 © 2009 IBM Corporation
Leading the Way
  Government Leaders Moving to Address These Challenges




                                            State of The Art covert surveillance system
National Border & Security                  based on Streams platform



                                            Realtime Information Sharing, Discovery &
Crime Prediction & Prevention               analysis




National Borders & Security:                Real time network intrusion detection, sub-
Cyber Security                              millisecond analysis and response




National Borders & Security:                Real time threat detection & prevention through
                                            Big Data & Watson
Threat Prediction & Prevention



                                                                              © 2009 IBM Corporation
Leading the Way
Maritime Threat Intelligence




10                             © 2009 IBM Corporation
Leading the Way
  Who is Talking to Whom


Stream A
                                                                                        Denoising & Social
                           Conversation Pairing          Speaker Detection               Network Analysis
                              A                   B     Olivier               Mihalis

                                     talks to                      talks to




                              C                   D   Ching-Yung              Upendra
Stream B                             talks to                      talks to
Stream C

                                                  E                           Deepak


                                                       After denoising



                           - Just-in-time              - Just-in-time                   - Social network

Stream D
                           - Features: Volumetrics     - Features: GSM domain           - Fusion technique
                           - Very high accuracy        - High accuracy                  - Iterative method
                           - Very low complexity       - Moderate complexity
                           - Robust to noise           - Robust to noise



                                                                                             © 2009 IBM Corporation
Leading the Way
 Department of Immigration and Citizenship (Australia)


Challenges
      DIAC, Australia has embarked on a major transformation program to fix key identity issues :
         Siloed databases, little connectivity between sources
         Gaps and vulnerabilities in their existing implementation
         Inconsistent user, citizen, and immigrant identity verification techniques
         Receive 4 million Visa applications annually
Solution
      Launched a four year program to transform existing systems using a Service Oriented Architecture (SOA) and implementing a
      client-centric organization by providing:
          Roles-based portals to case management personnel
         Single view of a person’ across all client data sources (over 150 million ‘person’ records)
         SOA transformation and integration of legacy environment
Business Benefits
         United previously fragmented person’ data and improved processing time 20%
         Improved ‘person’ identity resolution resulted in significant reduction in false negatives and inappropriate actions being
         taken
         Dramatic cost savings from streamlining associated business processes




 12                                                                                                                          © 2009 IBM Corporation
What We Have Learned
Big Data Requires A Different Approach – It Breaks The Traditional Analytics Model

 Traditional Approach                                 Big Data Approach

 Business Users                                                              IT
 Determine what question                                                     Delivers a platform to enable
 to ask                                                                      creative discovery




                       IT
                       Structures the data to         Business
                       answer that question           Explores what questions could
                                                      be asked




 Structured & Repeatable Analytics                    Iterative & Exploratory Analytics
 •Query Based -- Questions Drive Data                 •Autonomic -- Insight Drives Answers
 •Citizen Surveys – Push                        VS.   •Citizen Sentiment – Pull
 •Monthly, Weekly, Daily                              •Persistent & Ad Hoc
 •Data At Rest                                        •Data In Motion
                                                                                           © 2009 IBM Corporation
What We Have Learned
A New Approach Is Required – Smarter Analytics Supporting Big Data


Advanced Analytic Applications

                                              – Integrate and manage the full breadth of data
                                                types, and at full volume scale
                                              – Gain Insight from Data In Motion, Versus Data At
                                                Rest
                                              – Apply advanced analytics to information in its
                                                native form
                                              – Visualize all available data for ad-hoc analysis
                                              – Development environment for building new
Big Data Platform
                                                analytic applications
Process and analyze any type of data          – Workload optimization and scheduling
                                              – Security and Governance
                    Accelerators




                                                                                    © 2009 IBM Corporation
What We Have Learned
A Complete Set of Capabilities Is Required To Address The Challenge




                                                                      © 2009 IBM Corporation
What’s Required To Bridge The Gap
 Establish, Govern, Manage & Deliver Information That You Can Trust



                                   IBM InfoSphere Information Server

                                               Unified Deployment

        Understand                    Cleanse                         Transform                  Deliver




     Discover, model, and       Standardize, merge,                   Combine and          Synchronize, virtualize
      govern information       and correct information           restructure information   and move information
     structure and content                                            for new uses



                                    Unified Metadata Management

                                            Parallel Processing
                             Rich Connectivity to Applications, Data, and   Content



                                                                                                      © 2009 IBM Corporation
                                                                                                                            16
What’s Required To Bridge The Gap
     And Monitor Continuously & In Real Time


         Traditional Approach: Native Logging

•      Lives within the silo – limits visibility
•      Ex Post Facto, insecure, costly, inaccurate
•      Can’t identify who and when data is accessed
•      Does not block unauthorized data-extrusion
•      Severe negative impact on database performance




                                                        4th Generation Enterprise Activity Monitoring
                                                         Discovers and classifies sensitive data
                                                         Lock down on who has access to what
                                                         Identifies the specific person (IP address) who touched
                                                         the data, how and when – tamper proof audit
                                                         Provides separation of duties – access to DB functions
                                                         does not grant the individual the right to see all
                                                         sensitive information




                                                                                                   © 2009 IBM Corporation
What’s Required To Bridge The Gap
Persistent Relationship Awareness & Rules of Visibility




                                                    Queries & Data Flow
                                                    Through The Same
     DATA                                           “Smart” Channel        Enterprise


       DATA
                                                                                     Limited
     DATA                                           Alerts sent to
                                                    analyst
                                                    proactively


                                                                            Restricted




18                                                                        © 2009 IBM Corporation
What’s Required To Bridge The Gap
Persistent Relationship Awareness – IBM Identity Insight

A highly-specialized Identity Analytics repository providing real-time detection of obvious and non-obvious
relationships between people, organizations, events, and other identity types
                                                                            Addresses The Thorny Issues Of:
                                                                            •Realtime Discovery
                                                                            •Enterprise Amnesia - Continuous
                                                                            •Enterprise Brain Hemorrhage - Persistent
                                                                            •Complex and Expanding attribution
                                                                            •Degrees of Separation
     DATA                                                                   •Extensibility
                                                                            •Complex event processing Linked to Identities
                                                                            •Information pedigree and audit trail of
        DATA                                                                merges/splits
                                                                            •Anonymization

     DATA




19                                                                                                  © 2009 IBM Corporation
What’s Required To Bridge The Gap
Rules of Visibility – IBM Initiate
Provides accurate, real-time access to entity, object and event data across
disparate sources, systems and networks

 Relationship & Hierarchy Management Views
 Collaborative, Visual Data Stewardship Capabilities
 Data Security & Privacy
                                                                               Enterprise
 Search Capabilities
 Highly configurable/custom composite views
 Open integration options
 Dynamic implementation models
                                                                                         Limited
 Data security & privacy
 Reporting and analytics




                                                                                Restricted




20                                                                            © 2009 IBM Corporation
Taking it to the Next Level
    with Advanced Business Analytics



                                      What is
                                     happening     What could
                                                    happen?
                                                   Simulation

                                    How many,
                                    how often,
                                     where?
                                                      What if
                                                                  How can we achieve
                                                   these trends                             Language &
                                                                   the best outcome?
                                                     continue?                               Sentiment
                                       What                           Optimisation
                                                   Forecasting
                                     exactly is
                                        the
                                     problem?

                                                    What will      How can we achieve
Structured Data                                                                                                  What Are
                  Made                  What
                                                   happen next    the best outcome and      Extracting
                                                                                                                  People
& Unstructured    consumable and     actions are
                                                       if?         address variability?    concepts and
                                                    Predictive          Stochastic                             Talking About
Content           accessible to                                                            relationships
                                      needed?                                                                    & Feeling
                  everyone                          Modelling          Optimisation


                                   Descriptive     Predictive     Prescriptive            Content           Web
                                   Analytics       Analytics      Analytics               Analytics         Analytics



  21                                                                                                       © 2009 IBM Corporation
Today’s Discussion
If you only remember four things



         Intensifying threat and policy pressures have pushed agencies to a
     1   tipping point – they know they need to transform


         Agency leaders embrace this, are defining the new requirements,
     2   and are demonstrating success


         Achieving transformation requires a broad set of capabilities, and a
     3   combination of technology & expertise


         The experience and assets exist to help you define a strategy and
     4   a roadmap to guide your transformation




22                                                                           © 2009 IBM Corporation
                                FOR INTERNAL IBM USE ONLY

Contenu connexe

Tendances

CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape WebinarJoseph Schorr
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook EraJohn Mancini
 
How to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency IncidentsHow to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency IncidentsEverbridge, Inc.
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2fphart
 
Are You Ready for the Era of Big Data and Extreme Information Management?
Are You Ready for the Era of Big Data and Extreme Information Management?Are You Ready for the Era of Big Data and Extreme Information Management?
Are You Ready for the Era of Big Data and Extreme Information Management?John Mancini
 
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your OrganizationJesse Wilkins
 
What is an information professional?
What is an information professional?What is an information professional?
What is an information professional?John Mancini
 
White Paper - Operational Knowledge Management
White Paper - Operational Knowledge ManagementWhite Paper - Operational Knowledge Management
White Paper - Operational Knowledge ManagementDan Elder, MS
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
 
Social business and innovation
Social business and innovationSocial business and innovation
Social business and innovationJohn Mancini
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach FinalHossam Hassanien
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
Preparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CTPreparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CTEverbridge, Inc.
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Livingstone Advisory
 
Big data and the challenge of extreme information
Big data and the challenge of extreme informationBig data and the challenge of extreme information
Big data and the challenge of extreme informationJohn Mancini
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!wmetcalf
 
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information ProtectionRSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information ProtectionSymantec
 

Tendances (20)

CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape Webinar
 
Key considerations
Key considerationsKey considerations
Key considerations
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
How to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency IncidentsHow to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency Incidents
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
 
Are You Ready for the Era of Big Data and Extreme Information Management?
Are You Ready for the Era of Big Data and Extreme Information Management?Are You Ready for the Era of Big Data and Extreme Information Management?
Are You Ready for the Era of Big Data and Extreme Information Management?
 
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
 
What is an information professional?
What is an information professional?What is an information professional?
What is an information professional?
 
White Paper - Operational Knowledge Management
White Paper - Operational Knowledge ManagementWhite Paper - Operational Knowledge Management
White Paper - Operational Knowledge Management
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
 
Gmn full ad_mini-1
Gmn full ad_mini-1Gmn full ad_mini-1
Gmn full ad_mini-1
 
Social business and innovation
Social business and innovationSocial business and innovation
Social business and innovation
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Preparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CTPreparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CT
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
 
Big data and the challenge of extreme information
Big data and the challenge of extreme informationBig data and the challenge of extreme information
Big data and the challenge of extreme information
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
 
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information ProtectionRSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information Protection
 

En vedette

Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and SecurityEMC
 
Marketwired - Social Media in the Military: Mining & Monitoring
Marketwired - Social Media in the Military: Mining & MonitoringMarketwired - Social Media in the Military: Mining & Monitoring
Marketwired - Social Media in the Military: Mining & MonitoringJim Delaney
 
Unveiling FATA a Visual Journey.
Unveiling FATA a Visual Journey.Unveiling FATA a Visual Journey.
Unveiling FATA a Visual Journey.SRSP
 
How the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S modelHow the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S modelasafeiran
 
Structure is not organization
Structure is not organizationStructure is not organization
Structure is not organizationasafeiran
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Mckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative InvestmentsMckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative Investmentsasafeiran
 
Political Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and FuturePolitical Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and FutureShahid Hussain Raja
 

En vedette (10)

Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and Security
 
Marketwired - Social Media in the Military: Mining & Monitoring
Marketwired - Social Media in the Military: Mining & MonitoringMarketwired - Social Media in the Military: Mining & Monitoring
Marketwired - Social Media in the Military: Mining & Monitoring
 
Unveiling FATA a Visual Journey.
Unveiling FATA a Visual Journey.Unveiling FATA a Visual Journey.
Unveiling FATA a Visual Journey.
 
How the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S modelHow the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S model
 
Structure is not organization
Structure is not organizationStructure is not organization
Structure is not organization
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Mckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative InvestmentsMckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative Investments
 
Political Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and FuturePolitical Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and Future
 
Big Data and Advanced Analytics
Big Data and Advanced AnalyticsBig Data and Advanced Analytics
Big Data and Advanced Analytics
 

Similaire à Defense Intelligence & The Information Challenge

Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
Durso - Going Mobile:  Managing a Diverse and Dispersed WorkforceDurso - Going Mobile:  Managing a Diverse and Dispersed Workforce
Durso - Going Mobile: Managing a Diverse and Dispersed WorkforceHR Florida State Council, Inc.
 
Big Data Is Here - Now What?
Big Data Is Here - Now What?Big Data Is Here - Now What?
Big Data Is Here - Now What?Chris Selland
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligenceguest08b1e6
 
Presentation For IAC Federal Acquisition
Presentation For IAC Federal AcquisitionPresentation For IAC Federal Acquisition
Presentation For IAC Federal AcquisitionKim Kobza
 
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...IBM Sverige
 
Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...IBM Banking
 
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsInformation Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsIBMGovernmentCA
 
Cep 23 Decisive Intelligence Briefing V1 2
Cep 23 Decisive Intelligence Briefing V1 2Cep 23 Decisive Intelligence Briefing V1 2
Cep 23 Decisive Intelligence Briefing V1 2Freddie McMahon
 
Information på agendaen
Information på agendaenInformation på agendaen
Information på agendaenIBM Danmark
 
Why Traditional Intranets Fail Today's Knowledge Workers
Why Traditional Intranets Fail Today's Knowledge WorkersWhy Traditional Intranets Fail Today's Knowledge Workers
Why Traditional Intranets Fail Today's Knowledge WorkersTieto Corporation
 
Knowledge Management in the Department of Defense
Knowledge Management in the Department of DefenseKnowledge Management in the Department of Defense
Knowledge Management in the Department of Defensejoannhague
 
The Road to Business Agility
The Road to Business AgilityThe Road to Business Agility
The Road to Business AgilitySrini Koushik
 
Outsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan InformatiestrategieOutsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan InformatiestrategieJohn Septer
 
The Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 PresentationThe Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 PresentationMerck
 
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowJohn Mancini
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuwebtc01
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuwebsc01
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuweben01
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance frameworkkaiyun7631
 

Similaire à Defense Intelligence & The Information Challenge (20)

Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
Durso - Going Mobile:  Managing a Diverse and Dispersed WorkforceDurso - Going Mobile:  Managing a Diverse and Dispersed Workforce
Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
 
Big Data Is Here - Now What?
Big Data Is Here - Now What?Big Data Is Here - Now What?
Big Data Is Here - Now What?
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
Presentation For IAC Federal Acquisition
Presentation For IAC Federal AcquisitionPresentation For IAC Federal Acquisition
Presentation For IAC Federal Acquisition
 
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...How to become an Analytics-driven organization - and why bother? - IBM Smarte...
How to become an Analytics-driven organization - and why bother? - IBM Smarte...
 
Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...
 
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsInformation Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and Solutions
 
Cep 23 Decisive Intelligence Briefing V1 2
Cep 23 Decisive Intelligence Briefing V1 2Cep 23 Decisive Intelligence Briefing V1 2
Cep 23 Decisive Intelligence Briefing V1 2
 
Information på agendaen
Information på agendaenInformation på agendaen
Information på agendaen
 
Why Traditional Intranets Fail Today's Knowledge Workers
Why Traditional Intranets Fail Today's Knowledge WorkersWhy Traditional Intranets Fail Today's Knowledge Workers
Why Traditional Intranets Fail Today's Knowledge Workers
 
Knowledge Management in the Department of Defense
Knowledge Management in the Department of DefenseKnowledge Management in the Department of Defense
Knowledge Management in the Department of Defense
 
The Road to Business Agility
The Road to Business AgilityThe Road to Business Agility
The Road to Business Agility
 
Outsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan InformatiestrategieOutsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan Informatiestrategie
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
The Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 PresentationThe Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 Presentation
 
Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to Know
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance framework
 

Plus de IBMGovernmentCA

Cge leadership summit ibm presentation public sector analytics
Cge leadership summit   ibm presentation public sector analyticsCge leadership summit   ibm presentation public sector analytics
Cge leadership summit ibm presentation public sector analyticsIBMGovernmentCA
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security AnalyticsInvestigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security AnalyticsIBMGovernmentCA
 
CEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of ChangeCEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of ChangeIBMGovernmentCA
 
Overview of IBM Capabilities
Overview of IBM CapabilitiesOverview of IBM Capabilities
Overview of IBM CapabilitiesIBMGovernmentCA
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process ManagementIBMGovernmentCA
 
Smarter Computing Integrated Systems
Smarter Computing Integrated SystemsSmarter Computing Integrated Systems
Smarter Computing Integrated SystemsIBMGovernmentCA
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsIBMGovernmentCA
 
Perspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service ManagementPerspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service ManagementIBMGovernmentCA
 
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network AppliancesReducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network AppliancesIBMGovernmentCA
 
Improving Defence Program Execution
Improving Defence Program ExecutionImproving Defence Program Execution
Improving Defence Program ExecutionIBMGovernmentCA
 
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational AnalyticsA Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational AnalyticsIBMGovernmentCA
 
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...IBMGovernmentCA
 
Analytics for Smarter Defence
Analytics for Smarter DefenceAnalytics for Smarter Defence
Analytics for Smarter DefenceIBMGovernmentCA
 
Keynote phaedra boinodiris serious games beyond training from process optim...
Keynote phaedra boinodiris   serious games beyond training from process optim...Keynote phaedra boinodiris   serious games beyond training from process optim...
Keynote phaedra boinodiris serious games beyond training from process optim...IBMGovernmentCA
 
Business Analytics for Government
Business Analytics for GovernmentBusiness Analytics for Government
Business Analytics for GovernmentIBMGovernmentCA
 

Plus de IBMGovernmentCA (20)

Cge leadership summit ibm presentation public sector analytics
Cge leadership summit   ibm presentation public sector analyticsCge leadership summit   ibm presentation public sector analytics
Cge leadership summit ibm presentation public sector analytics
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security AnalyticsInvestigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Reputational Risk
Reputational RiskReputational Risk
Reputational Risk
 
CEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of ChangeCEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of Change
 
Overview of IBM Capabilities
Overview of IBM CapabilitiesOverview of IBM Capabilities
Overview of IBM Capabilities
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process Management
 
Smarter Computing Integrated Systems
Smarter Computing Integrated SystemsSmarter Computing Integrated Systems
Smarter Computing Integrated Systems
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter Governments
 
Perspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service ManagementPerspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service Management
 
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network AppliancesReducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
 
Improving Defence Program Execution
Improving Defence Program ExecutionImproving Defence Program Execution
Improving Defence Program Execution
 
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational AnalyticsA Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
 
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
 
Analytics for Smarter Defence
Analytics for Smarter DefenceAnalytics for Smarter Defence
Analytics for Smarter Defence
 
Keynote phaedra boinodiris serious games beyond training from process optim...
Keynote phaedra boinodiris   serious games beyond training from process optim...Keynote phaedra boinodiris   serious games beyond training from process optim...
Keynote phaedra boinodiris serious games beyond training from process optim...
 
Where Ideas Come From
Where Ideas Come FromWhere Ideas Come From
Where Ideas Come From
 
What Are The Chances
What Are The ChancesWhat Are The Chances
What Are The Chances
 
Business Analytics for Government
Business Analytics for GovernmentBusiness Analytics for Government
Business Analytics for Government
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Defense Intelligence & The Information Challenge

  • 1. Defense Intelligence & The Information Challenge Tim Paydos Director, IBM Threat Prediction & Prevention 9 October 2012 1 © 2009 IBM Corporation
  • 2. “In our ever-changing world, America's first line of defense is timely, accurate intelligence that is shared, integrated, analyzed and acted upon quickly and effectively.” - President Barack Obama, 1/7/10 This isn’t an Information Sharing Problem. Its an Information Management Problem. Information Sharing Is only one piece of the larger problem General Michael Hayden, Former Director CIA, Former Director NSA It is not just about sharing information. Its about making sense of it and exploiting it once we have it. There is too much information to identify that which is important. We need tools that tell us what’s important, and what is relevant. Juan Zarate, Deputy National Security Adviser for Combating Terrorism 2 © 2009 IBM Corporation © 2009 IBM Corporation
  • 3. Today’s Discussion If you only remember four things Intensifying threat and policy pressures have pushed agencies to a 1 tipping point – they know they need to transform Agency leaders embrace this, are defining the new requirements, 2 and are demonstrating success Achieving transformation requires a broad set of capabilities, and a 3 combination of technology & expertise The experience and assets exist to help you define a strategy and 4 a roadmap to guide your transformation 3 © 2009 IBM Corporation FOR INTERNAL IBM USE ONLY
  • 4. Agency Leaders Telling Us What They Need Trusted Information -- On Multiple Levels Insightful Comprehensive analytics to drive new meaning from your data Can I extract new Insight to make it all worthwhile? Governed & Secure Rules are in place and tools are deployed to limit visibility, secure sensitive information, and protect privacy Can I Trust My Partner and My Own Agency? Accurate & Complete Complex and disparate data transformed, cleansed, reconcile and delivered Can I Trust The Information? © 2009 IBM Corporation
  • 5. Military & Intelligence Agency Challenges Leaders Often Stuck Between A Rock And A Hard Place Today’s intensifying challenges mandate a fresh approach to Traditional Approaches managing threat information have become obsolete Multiplication of threat types, and frequency Information is compartmentalized – lack of full with which they occur integration obscures visibility Threats are increasingly asymmetrical Query State limits ability to address complexity of threats Explosion in complexity of threat identification Inability to manage and search across an expanding Multi cultural nature of citizenry array of unstructured data sources Frequency of transaction/interactions Inability to link unstructured content with structured data and manage together Social Media and “Big Data” playing an increasingly important role Untimely – Sense & Respond vs. Predict & Act Transparency is clouding Out of context – lack of visual analysis, collaboration, and support/guidance once threat is Citizen, Policy Maker and Regulatory identified expectations and pressures are increasing 5 © 2009 IBM Corporation
  • 6. The Big Data Challenge Is Only Making It Harder Big Data Is An Explosion In Volume, Variety & Velocity In 2008, we created 40 Exabytes – more than in all recorded history . Now we we create 2.5 Quintillion bytes, or 2.5 Exabytes of data each day — so much that 90% of the data in the world today has been created in the last two years alone. • For Every 5 Minutes In Realtime, 60 Hours Of Video Is Up-Loaded to You Tube • 12 terabytes of Tweets are created each day, providing insight into public sentiment Volume of Digital Data • 80% of all the data created daily is unstructured – videos, images, emails, and social media • Structured data now includes a massive range of sensors, click streams, log files, call records, transactions Variety of Information • 5 billion financial transactions occur every single day • There are 30,000 commercial air flights, accounting for 1,500,000 air passengers – every single day Velocity of Decision Making © 2009 IBM Corporation
  • 7. Smarter Agencies Leading The Way Optimize decision making with actionable insights Aware Obstructed view Aligned Variety Fragmented Inability to predict of insight Lack Volume Inefficient access Volume VelocityVelocity Rigid Agile Variety Inability to predict Volume Velocity Inefficient access Skilled analytics experts Everyone Lack of insight Variety Velocity Distracted Focused Reactive Proactive © 2009 IBM Corporation 7
  • 8. Leading the Way Government Leaders Moving to Address These Challenges Streamlined Information Sharing Western National 8 Law Enforcement Registry of Identities, Objects and Events Across Fed and Local Agencies Automated content extraction, entity Western National resolution and analysis from seized Child Predator Investigation Law Enforcement assets US Department of Connect the dots, predict and prevent Protecting the homeland Homeland Security threats US Department of Perpetual credentialing and vetting Insider Threat Defense across branches and bases Centralized Proactive enterprise data activity Screening Database monitoring & extrusion prevention Insider Threat © 2009 IBM Corporation
  • 9. Leading the Way Government Leaders Moving to Address These Challenges State of The Art covert surveillance system National Border & Security based on Streams platform Realtime Information Sharing, Discovery & Crime Prediction & Prevention analysis National Borders & Security: Real time network intrusion detection, sub- Cyber Security millisecond analysis and response National Borders & Security: Real time threat detection & prevention through Big Data & Watson Threat Prediction & Prevention © 2009 IBM Corporation
  • 10. Leading the Way Maritime Threat Intelligence 10 © 2009 IBM Corporation
  • 11. Leading the Way Who is Talking to Whom Stream A Denoising & Social Conversation Pairing Speaker Detection Network Analysis A B Olivier Mihalis talks to talks to C D Ching-Yung Upendra Stream B talks to talks to Stream C E Deepak After denoising - Just-in-time - Just-in-time - Social network Stream D - Features: Volumetrics - Features: GSM domain - Fusion technique - Very high accuracy - High accuracy - Iterative method - Very low complexity - Moderate complexity - Robust to noise - Robust to noise © 2009 IBM Corporation
  • 12. Leading the Way Department of Immigration and Citizenship (Australia) Challenges DIAC, Australia has embarked on a major transformation program to fix key identity issues : Siloed databases, little connectivity between sources Gaps and vulnerabilities in their existing implementation Inconsistent user, citizen, and immigrant identity verification techniques Receive 4 million Visa applications annually Solution Launched a four year program to transform existing systems using a Service Oriented Architecture (SOA) and implementing a client-centric organization by providing: Roles-based portals to case management personnel Single view of a person’ across all client data sources (over 150 million ‘person’ records) SOA transformation and integration of legacy environment Business Benefits United previously fragmented person’ data and improved processing time 20% Improved ‘person’ identity resolution resulted in significant reduction in false negatives and inappropriate actions being taken Dramatic cost savings from streamlining associated business processes 12 © 2009 IBM Corporation
  • 13. What We Have Learned Big Data Requires A Different Approach – It Breaks The Traditional Analytics Model Traditional Approach Big Data Approach Business Users IT Determine what question Delivers a platform to enable to ask creative discovery IT Structures the data to Business answer that question Explores what questions could be asked Structured & Repeatable Analytics Iterative & Exploratory Analytics •Query Based -- Questions Drive Data •Autonomic -- Insight Drives Answers •Citizen Surveys – Push VS. •Citizen Sentiment – Pull •Monthly, Weekly, Daily •Persistent & Ad Hoc •Data At Rest •Data In Motion © 2009 IBM Corporation
  • 14. What We Have Learned A New Approach Is Required – Smarter Analytics Supporting Big Data Advanced Analytic Applications – Integrate and manage the full breadth of data types, and at full volume scale – Gain Insight from Data In Motion, Versus Data At Rest – Apply advanced analytics to information in its native form – Visualize all available data for ad-hoc analysis – Development environment for building new Big Data Platform analytic applications Process and analyze any type of data – Workload optimization and scheduling – Security and Governance Accelerators © 2009 IBM Corporation
  • 15. What We Have Learned A Complete Set of Capabilities Is Required To Address The Challenge © 2009 IBM Corporation
  • 16. What’s Required To Bridge The Gap Establish, Govern, Manage & Deliver Information That You Can Trust IBM InfoSphere Information Server Unified Deployment Understand Cleanse Transform Deliver Discover, model, and Standardize, merge, Combine and Synchronize, virtualize govern information and correct information restructure information and move information structure and content for new uses Unified Metadata Management Parallel Processing Rich Connectivity to Applications, Data, and Content © 2009 IBM Corporation 16
  • 17. What’s Required To Bridge The Gap And Monitor Continuously & In Real Time Traditional Approach: Native Logging • Lives within the silo – limits visibility • Ex Post Facto, insecure, costly, inaccurate • Can’t identify who and when data is accessed • Does not block unauthorized data-extrusion • Severe negative impact on database performance 4th Generation Enterprise Activity Monitoring Discovers and classifies sensitive data Lock down on who has access to what Identifies the specific person (IP address) who touched the data, how and when – tamper proof audit Provides separation of duties – access to DB functions does not grant the individual the right to see all sensitive information © 2009 IBM Corporation
  • 18. What’s Required To Bridge The Gap Persistent Relationship Awareness & Rules of Visibility Queries & Data Flow Through The Same DATA “Smart” Channel Enterprise DATA Limited DATA Alerts sent to analyst proactively Restricted 18 © 2009 IBM Corporation
  • 19. What’s Required To Bridge The Gap Persistent Relationship Awareness – IBM Identity Insight A highly-specialized Identity Analytics repository providing real-time detection of obvious and non-obvious relationships between people, organizations, events, and other identity types Addresses The Thorny Issues Of: •Realtime Discovery •Enterprise Amnesia - Continuous •Enterprise Brain Hemorrhage - Persistent •Complex and Expanding attribution •Degrees of Separation DATA •Extensibility •Complex event processing Linked to Identities •Information pedigree and audit trail of DATA merges/splits •Anonymization DATA 19 © 2009 IBM Corporation
  • 20. What’s Required To Bridge The Gap Rules of Visibility – IBM Initiate Provides accurate, real-time access to entity, object and event data across disparate sources, systems and networks Relationship & Hierarchy Management Views Collaborative, Visual Data Stewardship Capabilities Data Security & Privacy Enterprise Search Capabilities Highly configurable/custom composite views Open integration options Dynamic implementation models Limited Data security & privacy Reporting and analytics Restricted 20 © 2009 IBM Corporation
  • 21. Taking it to the Next Level with Advanced Business Analytics What is happening What could happen? Simulation How many, how often, where? What if How can we achieve these trends Language & the best outcome? continue? Sentiment What Optimisation Forecasting exactly is the problem? What will How can we achieve Structured Data What Are Made What happen next the best outcome and Extracting People & Unstructured consumable and actions are if? address variability? concepts and Predictive Stochastic Talking About Content accessible to relationships needed? & Feeling everyone Modelling Optimisation Descriptive Predictive Prescriptive Content Web Analytics Analytics Analytics Analytics Analytics 21 © 2009 IBM Corporation
  • 22. Today’s Discussion If you only remember four things Intensifying threat and policy pressures have pushed agencies to a 1 tipping point – they know they need to transform Agency leaders embrace this, are defining the new requirements, 2 and are demonstrating success Achieving transformation requires a broad set of capabilities, and a 3 combination of technology & expertise The experience and assets exist to help you define a strategy and 4 a roadmap to guide your transformation 22 © 2009 IBM Corporation FOR INTERNAL IBM USE ONLY