Soumettre la recherche
Mettre en ligne
Data security in a big data environment sweden
•
1 j'aime
•
1,286 vues
IBM Sverige
Suivre
Data Security in bid data environment - Dave Valovcins
Lire moins
Lire la suite
Données & analyses
Technologie
Signaler
Partager
Signaler
Partager
1 sur 19
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
solarisyougood
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
nazeer325
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
Data Driven Security in SSAS
Data Driven Security in SSAS
Mike Duffy
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
Recommandé
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
solarisyougood
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
nazeer325
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
Data Driven Security in SSAS
Data Driven Security in SSAS
Mike Duffy
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Peter Tutty
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
Auditing in the Cloud
Auditing in the Cloud
tcarrucan
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Michael Davis
Cloud Audit and Compliance
Cloud Audit and Compliance
Quadrisk
Guardium Presentation
Guardium Presentation
tsteh
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
Imperva
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
Cloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
Josh Tullo
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
Jonathan Sinclair
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
Securing Your Cloud Applications
Securing Your Cloud Applications
IBM Security
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
ISSA: Cloud data security
ISSA: Cloud data security
Ulf Mattsson
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Ulf Mattsson
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
Personal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
Dr. Ahmed Al Zaidy
Data security in the cloud
Data security in the cloud
IBM Security
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
David valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
Contenu connexe
Tendances
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Peter Tutty
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
Auditing in the Cloud
Auditing in the Cloud
tcarrucan
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Michael Davis
Cloud Audit and Compliance
Cloud Audit and Compliance
Quadrisk
Guardium Presentation
Guardium Presentation
tsteh
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
Imperva
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
Cloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
Josh Tullo
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
Jonathan Sinclair
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
Securing Your Cloud Applications
Securing Your Cloud Applications
IBM Security
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
ISSA: Cloud data security
ISSA: Cloud data security
Ulf Mattsson
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Ulf Mattsson
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
Personal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
Dr. Ahmed Al Zaidy
Tendances
(19)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Auditing in the Cloud
Auditing in the Cloud
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Cloud Audit and Compliance
Cloud Audit and Compliance
Guardium Presentation
Guardium Presentation
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Cloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
Securing Your Cloud Applications
Securing Your Cloud Applications
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
ISSA: Cloud data security
ISSA: Cloud data security
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Personal Data Protection in Indonesia
Personal Data Protection in Indonesia
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
Similaire à Data security in a big data environment sweden
Data security in the cloud
Data security in the cloud
IBM Security
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
David valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
Praveenkumar Hosangadi
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
IBM Analytics
Bridging the Data Security Gap
Bridging the Data Security Gap
xband
Perimeter Security is Failing
Perimeter Security is Failing
UL Transaction Security
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
Why You Need to Govern Big Data
Why You Need to Govern Big Data
IBM Analytics
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
UL Transaction Security
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
IBM Security
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
InfinIT - Innovationsnetværket for it
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
Data Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
Santiago Cavanna
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Sridhar Karnam
Big data security the perfect storm
Big data security the perfect storm
Ulf Mattsson
Data Loss Prevention
Data Loss Prevention
Reza Kopaee
Similaire à Data security in a big data environment sweden
(20)
Data security in the cloud
Data security in the cloud
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
David valovcin big data - big risk
David valovcin big data - big risk
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
Bridging the Data Security Gap
Bridging the Data Security Gap
Perimeter Security is Failing
Perimeter Security is Failing
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Why You Need to Govern Big Data
Why You Need to Govern Big Data
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
Data Loss Prevention from Symantec
Data Loss Prevention from Symantec
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Big data security the perfect storm
Big data security the perfect storm
Data Loss Prevention
Data Loss Prevention
Plus de IBM Sverige
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
IBM Sverige
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
IBM Sverige
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
IBM Sverige
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
IBM Sverige
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
IBM Sverige
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
IBM Sverige
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
IBM Sverige
Blockchain explored
Blockchain explored
IBM Sverige
Blockchain architected
Blockchain architected
IBM Sverige
Blockchain explained
Blockchain explained
IBM Sverige
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
IBM Sverige
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
IBM Sverige
Power ai nordics dcm
Power ai nordics dcm
IBM Sverige
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
IBM Sverige
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
IBM Sverige
Ac922 watson 180208 v1
Ac922 watson 180208 v1
IBM Sverige
Watson kista summit 2018 box
Watson kista summit 2018 box
IBM Sverige
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
IBM Sverige
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
IBM Sverige
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
IBM Sverige
Plus de IBM Sverige
(20)
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
Blockchain explored
Blockchain explored
Blockchain architected
Blockchain architected
Blockchain explained
Blockchain explained
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
Power ai nordics dcm
Power ai nordics dcm
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
Ac922 watson 180208 v1
Ac922 watson 180208 v1
Watson kista summit 2018 box
Watson kista summit 2018 box
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
Dernier
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
JohnnyPlasten
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
Invezz1
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
hf8803863
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
Suhani Kapoor
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
Timothy Spann
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
Emmanuel Dauda
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
Sapana Sha
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
Suhani Kapoor
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
AroojKhan71
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
olyaivanovalion
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
ccctableauusergroup
Halmar dropshipping via API with DroFx
Halmar dropshipping via API with DroFx
olyaivanovalion
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
olyaivanovalion
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
firstjob4
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
Aishani27
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
Anupama Kate
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
olyaivanovalion
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
thyngster
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
Dernier
(20)
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
Halmar dropshipping via API with DroFx
Halmar dropshipping via API with DroFx
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
Data security in a big data environment sweden
1.
© 2014 IBM
Corporation Data Security in a Big Data Environment David Valovcin Worldwide Guardium dvalovcin@us.ibm.com May 2014
2.
2 © 2014
IBM Corporation Data Breaches are in the News Every Week A “Fear Factor” is causing some orgs to hold back on new mobile, cloud, and big data initiatives Data-breach costs take toll on Target profit … its profit in the fourth quarter fell 46 percent on a revenue decline of 5.3 percent as the breach scared off customers worried about the security of their private data. Account Takeover: Bank Faces Two Suits Health Breach Tally: 30 Million Victims More than 30.6 million individuals have been affected by major healthcare data breaches since September 2009 Canadian Breach: Sorting Out the Cause Gaps in carrying out security policies led to the exposure of 583,000 records last year at Employment and Social Development Canada,totaling $1.5 million in allegedly fraudulent wires
3.
3 © 2014
IBM Corporation Target – first the CIO, now the CEO fired
4.
4 © 2014
IBM Corporation Data Breaches Happen Close to Home
5.
5 © 2014
IBM Corporation Not Only For Financial Gain
6.
6 © 2014
IBM Corporationhttp://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z038 Time span of events by percent of breaches Guardium Discovery Guardium DAM Guardium VA Guardium DAM Adv. (block/mask) Guardium Encryption Minutes To Compromise, Months To Discover & Remediate Time span of events by percent of breaches
7.
7 © 2014
IBM Corporation Can you prove that privileged users have not inappropriately accessed or jeopardized the integrity of your sensi7ve Big Data?
8.
8 © 2014
IBM Corporation Sensitive Data Is at Risk 70% of organizations surveyed use live customer data in non-production environments (testing, Q/A, development) Database Trends and Applications. Ensuring Protection for Sensitive Test Data The Ponemon Institute. The Insecurity of Test Data: The Unseen Crisis 52% of surveyed organizations outsource development 50% of organizations surveyed have no way of knowing if data used in test was compromised The Ponemon Institute. The Insecurity of Test Data: The Unseen Crisis $188 per record cost of a data breach The Ponemon Institute. 2013 Cost of Data Beach Study $5.4M Average cost of a data breach $3M cost of losing customer loyalty (lost business) following a data breach The True Cost of Compliance, The Cost of a Data Breach, Ponemon Institute, 2011 The Ponemon Institute. 2013 Cost of Data Beach Study 62% of organizations surveyed are not tracking their privileged users IBM CISO SUrvey 2012 Data Breach Report from Verizon Business RISK Team 90+% Breaches go after data in servers
9.
9 © 2014
IBM Corporation $3.5MYearly average cost of compliance Company Data Security approach Audit events/ year Average cost/ audit Data loss events/year Average cost/ data loss Total cost (adjusted per TB) w/o data security 6.3 $24K 2.3 $130K $449K/TB w/ data security 1.7 1.4 $223K/TB Annual Cost of not implementing data security $226K/TB Total annual cost of doing nothing in BIG DATA compliance: (for average Big Data organization with 180 TB of business data) $40+ M Source: Aberdeen Group. Why Information Governance Must be Addressed Right Now. 2012 Doing Nothing Is Expensive Source: The True Cost of Compliance, The Cost of a Data Breach, Ponemon Institute, 2011 $5.4MAverage cost of a data breach
10.
10 © 2014
IBM Corporation A Key Driver: Maintaining Brand Reputation • 66%of US Adults would not return to a business if personal data was stolen • 76%of Survey respondents indicated that a data breach had a moderate to significant impact on their business • $184M - $330Mbrand value lost each victim of a data breach
11.
11 © 2014
IBM Corporation Big Data Toolset: what is missing? § Authentication – Interface – Interprocess § Authorization – Coarse – Fine grained – Role based § Encryption – Interprocess – At-rest – Real-time § Privacy protection – At rest – Real-time § Auditing § Monitoring § Governance – Discovery – Entitlements
12.
12 © 2014
IBM Corporation IBM InfoSphere Data Security and Privacy Solutions InfoSphere Data Privacy for Hadoop InfoSphere Data Privacy and Security for Data Warehousing Exadata InfoSphere Data Security and Privacy Define and Share Discover and Classify Mask and Redact Monitor Data Activity Purpose-Built Capabilities • Secure and Protect Sensitive big data • Extend Compliance Controls • Promote Information Sharing • Employ across diverse environments • Achieve and enforce compliance • Secure and Protect sensitive data in data warehouses • Reduce costs of attaining enterprise security
13.
13 © 2014
IBM Corporation Applying IBM’s Data Security Approach to Big Data SOURCE SYSTEMS, DATA MARTS, SILOS BIG DATA PLATFORM USER ACCESS REQUESTS 3) Mitigating Risks with Data Protection 1) Understanding the Risks 2) Uncovering the Exposure 4) Maintaining a Tolerant Risk Level 5) Expansion to the Enterprise 1 2 3 4 5
14.
14 © 2014
IBM Corporation Where is the sensitive data? How to prevent unauthorized activities? How to protect sensitive data to reduce risk? How to secure the repository? Discovery Classification Identity & Access Management Activity Monitoring Blocking Quarantine Masking/ EncryptionAssessment Who should have access? What is actually happening? Discover Harden Mask Monitor Block Security Policies Dormant En9tlements Dormant Data Compliance Repor9ng & Security Alerts Data Protec9on & Enforcement Key Questions . . .
15.
15 © 2014
IBM Corporation Discovery Classification Identity & Access Management Activity Monitoring Blocking Quarantine Masking/ EncryptionAssessment Discover Harden Mask Monitor Block Guardium VA ü Assessment reports ü Subscrip7on ü Configura7on Changes ü En7tlement Repor7ng Guardium Standard ü Discovery & Classifica7on ü Queries & Reports ü Compliance Workflow ü Group Management ü Integra7ons ü Incident Management ü Self Monitoring Guardium Data Redaction ü Redact sensi7ve documents Optim Data Privacy ü Mask sensi7ve data in test, publishing in databases and Big Data environments Guardium DAM ü Ac7vity Monitoring ü Real-‐7me alerts ü Compliance Repor7ng ü Blocking ü Dynamic Masking ü Users Quaran7ne ü Federate large deployment ü Central control ü Central audit collec7on Guardium Data Encryption ü File-‐level encryp7on ü Policy-‐based Access control IBM Can Help With the Answers Guardium DAM ü Ac7vity Monitoring ü Real-‐7me alerts ü Compliance Repor7ng ü Blocking ü Dynamic Masking ü Users Quaran7ne ü Federate large deployment ü Central control ü Central audit collec7on InfoSphere Data Privacy and Security for Hadoop
16.
16 © 2014
IBM Corporation InfoSphere BigInsights DATABASES FTP ExadataDATABASE HANA Optim Archival Siebel, PeopleSoft, E-Business Master Data Management Data Stage CIC S One Technology to Control it All DAM Encryption Masking VA Redaction 1 6
17.
17 © 2014
IBM Corporation Scalable Multi-Tier Architecture Integration with LDAP, IAM, SIEM, IBM TSM, BMC Remedy, …
18.
18 © 2014
IBM Corporation Link to the case study http://public.dhe.ibm.com/ common/ssi/ecm/en/ imc14573usen/ IMC14573USEN.PDF A Private Bank in the UAE automates security compliance reporting in a big data environment Need • The bank processes several terabytes of data daily and required a solution which addressed the new security risks evolving around the world, especially with respect to protecting big data environments. Benefits • Achieves ROI in 8 months • A scalable security monitoring solution that supports diverse database environment and does not impact application performance • The time required to produce audit and compliance reports has gone from two months to near real-time
19.
19 © 2014
IBM Corporation
Télécharger maintenant