SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Copyright 2016 Prescient Holdings, LLC
Bespoke Solutions for Data Curation, Analysis, Dissemination, and Visualization
PrescientTraveler™ leverages decades of success in high-stakes intelligence operations,
irregular warfare, crisis management, threat analysis, and complex systems design to keep
international travelers safe. Purpose-built software and advanced analytic systems are used to
aggregate, evaluate, distribute, and visualize threat and safety-related information.
DATA AGGREGATION, CURATION, AND ANALYSIS FOR
SAFETY SITUATIONAL AWARENESS
SECURITY & Emergent Threat Detection and Incident Alerting
 Continuous Monitoring of Asset-Threat Proximities
 Venue-specific Threat and Business Continuity Assessments
 Low-bandwidth, Secure Communications
Copyright 2016 Prescient Holdings, LLC
Bespoke Solutions for Data Curation, Analysis, Dissemination, and Visualization
DATA AGGREGATION, CURATION, AND ANALYSIS FOR
SAFETY SITUATIONAL AWARENESS
SECURITY &Flexible Models and Processes
Scalability
High Availability (DR/HA)
DEMANDS
Copyright 2016 Prescient Holdings, LLC
Bespoke Solutions for Data Curation, Analysis, Dissemination, and Visualization
DATA AGGREGATION, CURATION, AND ANALYSIS FOR
SAFETY SITUATIONAL AWARENESS
SECURITY &Flexible Models and Processes
Scalability
High Availability (DR/HA)
DEMANDS
TECH-HUMAN BALANCE (FOR BUSINESS PERFORMANCE)
Copyright 2016 Prescient Holdings, LLC
Mobile App Features and Capabilities
• Real-time threat alerts for your location & demographics
• Real-Time tracking and monitoring of travelers
• Country and City based reporting
• Selected points of interest and safe sites
Prescient Traveler Mobile Application
Copyright 2016 Prescient Holdings, LLC
While production analytics and operational
data are managed on premises,
autonomous failover to a remote data
center (on a different segment of the
national power grid) provides disaster
resilience. High Performance, Availability,
and Scalability were core design
requirements.
Copyright 2016 Prescient Holdings, LLC
Failover
Sites
Real-time Worldview for Safety and Security Stakeholders
sys·tem /ˈsistəm/ noun
1. a set of connected things or parts forming a complex whole.
Copyright 2016 Prescient Holdings, LLC
A Few Basic Questions that we all face
What is the problem to be solved?
Will the solution fit within a viable business
model?
What tools are best suited for the work to be
done?
How much is known, unknown but knowable,
and unknowable?
I.e. How complete is your model?
Copyright 2016 Prescient Holdings, LLC
A Few Basic Questions
What is the problem to be solved?
Improve Traveler Safety and Business
Continuity
Will the solution fit within a viable business
model?
Yes, with sufficient automation
What tools are best suited for the work to be
done?
For Prescient: Hadoop, SAP HANA,
MongoDB, NiFi
How much is known, unknown but knowable,
and unknowable?
I.e. How complete is your model?
Guestimate: 5%, 70%, 25%
Copyright 2016 Prescient Holdings, LLC
A Few Basic Questions
What is the problem to be solved?
Improve Traveler Safety and Business
Continuity
Will the solution fit within a viable business
model?
Yes, with sufficient automation
What tools are best suited for the work to be
done?
For Prescient: Hadoop, SAP HANA,
MongoDB, NiFi
How much is known, unknown but knowable,
and unknowable?
I.e. How complete is your model?
Guestimate: 5%, 70%, 25%
Project Phase 1 2 3
We Are Here
Copyright 2016 Prescient Holdings, LLC
Deeper Questions
How do you figure out what you know? Model → Ingest/Collect → Test → Refine → Repeat
What must you do to convert unknowns in to
knowns?
Extract Signal from Noise
What can you do to mitigate the risks created
by the unknowable?
Interpolate + Infer + Hypothesize
How much is known, unknown but knowable,
and unknowable?
I.e. How complete is your model?
Guestimate: 5%, 70%, 25%
Inference
PredictiveProject Phase 1 2 3
We Are Here
Copyright 2016 Prescient Holdings, LLC
Deeper Questions
How do you figure out what you know? Model → Ingest/Collect → Test → Refine → Repeat
What must you do to convert unknowns in to
knowns?
Extract Signal from Noise
What can you do to mitigate the risks created
by the unknowable?
Interpolate + Infer + Hypothesize
How much is known, unknown but knowable,
and unknowable?
I.e. How complete is your model?
Guestimate: 5%, 70%, 25%
Inference
PredictiveProject Phase 1 2 3
We Are Here
Copyright 2016 Prescient Holdings, LLC
Entities of Special Interest & Foundational Concepts
• Location – Geographic area characterized by cultural norms,
taboos, and chronic or emergent threats
• Traveler – Person with exploitable attributes, proximities to
threats, and an associated risk profile
• Itinerary – Traveler’s scheduled exposures to threats
• Threat Parameterization – Proprietary process by which threat
vectors are correlated with traveler attributes
Partially expanded data models upon which
linguistic, geospatial, and multi-variable
analyses are performed using SAP HANA,
Hadoop, and a variety of purpose-built tools.
Hundreds of defined entities and the
thousands of relationships between
them permit, among other things:
• Automated Entity Extraction for
Threat Detection and Identification
• Sentiment Analysis on Social Media
and News Feeds
• Threat-Proximity Alerting
• Quantification of Exposure Across
Threat Domains, Locations, and
User Populations
A small region of the
PrescientTraveler™ Ontology
Data Modeling for Advanced Analytics
Locate, Curate, Organize, Analyze, and Produce Information that Helps Users
stay safe and remain productive
Asset profiles and itineraries are correlated with
parameterized threats. Cultural and Safety
Parity Assessments are performed for Home and
Destination Locations.
Myriad sources are curated then translated into risk-mitigating recommendations.
Copyright 2016 Prescient Holdings, LLC
... + RSS Feeds + Social Media + Breaking News + Crime, Health, and Disaster Statistics + Economic Stability Indicators + ...
Proprietary Interfaces, Applications, and Methods
Copyright 2016 Prescient Holdings, LLC
Below The Surface
Advanced Tools for Big Data Aggregation and Analysis
Event-Driven
Realtime
Copyright 2016 Prescient Holdings, LLC
As of 08:00 CST on 24 JUNE 2016, a total of 48,217 distinct threat data sources had been indexed and ingested by the Prescient Platform
PT API DB
A BA B
QGIS
Proprietary
Parsers
PostGIS
ArcMap
SMART DATA ACCESS
Locations of Interest, Profiles, Timelines
REST API
PrescientTraveler Applications
Content
Builder
Dashboard
Mobile
MongoDB
Data Curation
Toolset
(DCT with NiFi)
REST API
Client
Authentication
Examples of Realtime Alerts
• Significant Environmental Events
• Infrastructure Shortfalls
• Civil Unrest
• Terror Attacks
• Emerging Pandemics
• Geopolitical Instabilities
RSS
Social Media
Local Sources
Crime Stats
Economic Data
News
Forums
...
...
Public Bulletins
Case Studies
...
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Copyright 2016 Prescient Holdings, LLC
Protection of
international
travelers
requires real-
time,
actionable data
that is
analyzed and
simplified by
human experts.We’re Prescient,
and we’re humanizing
intelligence.
Copyright 2016 Prescient Holdings, LLC

Weitere ähnliche Inhalte

Was ist angesagt?

Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Hortonworks
 
The Challenge of Driving Business Value from the Analytics of Things (AOT)
The Challenge of Driving Business Value from the Analytics of Things (AOT)The Challenge of Driving Business Value from the Analytics of Things (AOT)
The Challenge of Driving Business Value from the Analytics of Things (AOT)DataWorks Summit/Hadoop Summit
 
Spark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun MurthySpark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun MurthySpark Summit
 
Real-time Analytics in Financial
Real-time Analytics in FinancialReal-time Analytics in Financial
Real-time Analytics in FinancialYifeng Jiang
 
Hilton's enterprise data journey
Hilton's enterprise data journeyHilton's enterprise data journey
Hilton's enterprise data journeyDataWorks Summit
 
Inside open metadata—the deep dive
Inside open metadata—the deep diveInside open metadata—the deep dive
Inside open metadata—the deep diveDataWorks Summit
 
Hortonworks - IBM Cognitive - The Future of Data Science
Hortonworks - IBM Cognitive - The Future of Data ScienceHortonworks - IBM Cognitive - The Future of Data Science
Hortonworks - IBM Cognitive - The Future of Data ScienceThiago Santiago
 
Social Media Monitoring with NiFi, Druid and Superset
Social Media Monitoring with NiFi, Druid and SupersetSocial Media Monitoring with NiFi, Druid and Superset
Social Media Monitoring with NiFi, Druid and SupersetThiago Santiago
 
Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar Hortonworks
 
The Power of your Data Achieved - Next Gen Modernization
The Power of your Data Achieved - Next Gen ModernizationThe Power of your Data Achieved - Next Gen Modernization
The Power of your Data Achieved - Next Gen ModernizationHortonworks
 
Moving Health Care Analytics to Hadoop to Build a Better Predictive Model
Moving Health Care Analytics to Hadoop to Build a Better Predictive ModelMoving Health Care Analytics to Hadoop to Build a Better Predictive Model
Moving Health Care Analytics to Hadoop to Build a Better Predictive ModelDataWorks Summit
 
Pouring the Foundation: Data Management in the Energy Industry
Pouring the Foundation: Data Management in the Energy IndustryPouring the Foundation: Data Management in the Energy Industry
Pouring the Foundation: Data Management in the Energy IndustryDataWorks Summit
 
Beyond Big Data: Data Science and AI
Beyond Big Data: Data Science and AIBeyond Big Data: Data Science and AI
Beyond Big Data: Data Science and AIDataWorks Summit
 
Hybrid Data Architecture: Integrating Hadoop with a Data Warehouse
Hybrid Data Architecture: Integrating Hadoop with a Data WarehouseHybrid Data Architecture: Integrating Hadoop with a Data Warehouse
Hybrid Data Architecture: Integrating Hadoop with a Data WarehouseDataWorks Summit
 

Was ist angesagt? (20)

Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics
 
Extending Hortonworks with Oracle's Big Data Platform
Extending Hortonworks with Oracle's Big Data PlatformExtending Hortonworks with Oracle's Big Data Platform
Extending Hortonworks with Oracle's Big Data Platform
 
Hadoop Crash Course
Hadoop Crash CourseHadoop Crash Course
Hadoop Crash Course
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 
The Challenge of Driving Business Value from the Analytics of Things (AOT)
The Challenge of Driving Business Value from the Analytics of Things (AOT)The Challenge of Driving Business Value from the Analytics of Things (AOT)
The Challenge of Driving Business Value from the Analytics of Things (AOT)
 
Spark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun MurthySpark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun Murthy
 
Real-time Analytics in Financial
Real-time Analytics in FinancialReal-time Analytics in Financial
Real-time Analytics in Financial
 
Marketing vs Technology
Marketing vs TechnologyMarketing vs Technology
Marketing vs Technology
 
Hilton's enterprise data journey
Hilton's enterprise data journeyHilton's enterprise data journey
Hilton's enterprise data journey
 
Inside open metadata—the deep dive
Inside open metadata—the deep diveInside open metadata—the deep dive
Inside open metadata—the deep dive
 
Hortonworks - IBM Cognitive - The Future of Data Science
Hortonworks - IBM Cognitive - The Future of Data ScienceHortonworks - IBM Cognitive - The Future of Data Science
Hortonworks - IBM Cognitive - The Future of Data Science
 
Social Media Monitoring with NiFi, Druid and Superset
Social Media Monitoring with NiFi, Druid and SupersetSocial Media Monitoring with NiFi, Druid and Superset
Social Media Monitoring with NiFi, Druid and Superset
 
Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar
 
The Power of your Data Achieved - Next Gen Modernization
The Power of your Data Achieved - Next Gen ModernizationThe Power of your Data Achieved - Next Gen Modernization
The Power of your Data Achieved - Next Gen Modernization
 
Moving Health Care Analytics to Hadoop to Build a Better Predictive Model
Moving Health Care Analytics to Hadoop to Build a Better Predictive ModelMoving Health Care Analytics to Hadoop to Build a Better Predictive Model
Moving Health Care Analytics to Hadoop to Build a Better Predictive Model
 
Smart data for a predictive bank
Smart data for a predictive bankSmart data for a predictive bank
Smart data for a predictive bank
 
Pouring the Foundation: Data Management in the Energy Industry
Pouring the Foundation: Data Management in the Energy IndustryPouring the Foundation: Data Management in the Energy Industry
Pouring the Foundation: Data Management in the Energy Industry
 
Hadoop Summit Tokyo HDP Sandbox Workshop
Hadoop Summit Tokyo HDP Sandbox Workshop Hadoop Summit Tokyo HDP Sandbox Workshop
Hadoop Summit Tokyo HDP Sandbox Workshop
 
Beyond Big Data: Data Science and AI
Beyond Big Data: Data Science and AIBeyond Big Data: Data Science and AI
Beyond Big Data: Data Science and AI
 
Hybrid Data Architecture: Integrating Hadoop with a Data Warehouse
Hybrid Data Architecture: Integrating Hadoop with a Data WarehouseHybrid Data Architecture: Integrating Hadoop with a Data Warehouse
Hybrid Data Architecture: Integrating Hadoop with a Data Warehouse
 

Andere mochten auch

Andere mochten auch (11)

Processing and retrieval of geotagged unmanned aerial system telemetry
Processing and retrieval of geotagged unmanned aerial system telemetry Processing and retrieval of geotagged unmanned aerial system telemetry
Processing and retrieval of geotagged unmanned aerial system telemetry
 
The Future of Apache Hadoop an Enterprise Architecture View
The Future of Apache Hadoop an Enterprise Architecture ViewThe Future of Apache Hadoop an Enterprise Architecture View
The Future of Apache Hadoop an Enterprise Architecture View
 
The Ecosystem is too damn big
The Ecosystem is too damn big The Ecosystem is too damn big
The Ecosystem is too damn big
 
Current trends in library science research
Current trends in library science researchCurrent trends in library science research
Current trends in library science research
 
Scalable OCR with NiFi and Tesseract
Scalable OCR with NiFi and TesseractScalable OCR with NiFi and Tesseract
Scalable OCR with NiFi and Tesseract
 
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
A Data Lake and a Data Lab to Optimize Operations and Safety within a nuclear...
 
Apache Hive ACID Project
Apache Hive ACID ProjectApache Hive ACID Project
Apache Hive ACID Project
 
Hive Does ACID
Hive Does ACIDHive Does ACID
Hive Does ACID
 
Building a Data Analytics PaaS for Smart Cities
Building a Data Analytics PaaS for Smart CitiesBuilding a Data Analytics PaaS for Smart Cities
Building a Data Analytics PaaS for Smart Cities
 
How to build a successful Data Lake
How to build a successful Data LakeHow to build a successful Data Lake
How to build a successful Data Lake
 
Comparison of Transactional Libraries for HBase
Comparison of Transactional Libraries for HBaseComparison of Transactional Libraries for HBase
Comparison of Transactional Libraries for HBase
 

Ähnlich wie Data Aggregation, Curation and analytics for security and situational awareness

You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionCrowdStrike
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskSarah Clarke
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
cyberready-solutions
cyberready-solutionscyberready-solutions
cyberready-solutionsNoah Kline
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM
 
Comment aider les entreprises à trouver et implémenter de nouvelles sources d...
Comment aider les entreprises à trouver et implémenter de nouvelles sources d...Comment aider les entreprises à trouver et implémenter de nouvelles sources d...
Comment aider les entreprises à trouver et implémenter de nouvelles sources d...TelecomValley
 
Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityGeorg Knon
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security OperationsPriyanka Aash
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecuritySPLICE Software
 
Presentación Ramachandran Narayanan/ Nisum - eCommerce Day Santiago 2017
Presentación Ramachandran Narayanan/ Nisum - eCommerce Day Santiago 2017Presentación Ramachandran Narayanan/ Nisum - eCommerce Day Santiago 2017
Presentación Ramachandran Narayanan/ Nisum - eCommerce Day Santiago 2017eCommerce Institute
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax Technology
 
AR - Applying Big Data to Risk Management
AR - Applying Big Data to Risk ManagementAR - Applying Big Data to Risk Management
AR - Applying Big Data to Risk ManagementValentine Seivert
 

Ähnlich wie Data Aggregation, Curation and analytics for security and situational awareness (20)

Data Science for Cyber Risk
Data Science for Cyber RiskData Science for Cyber Risk
Data Science for Cyber Risk
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
cyberready-solutions
cyberready-solutionscyberready-solutions
cyberready-solutions
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019ZIGRAM Introduction Deck June 2019
ZIGRAM Introduction Deck June 2019
 
Comment aider les entreprises à trouver et implémenter de nouvelles sources d...
Comment aider les entreprises à trouver et implémenter de nouvelles sources d...Comment aider les entreprises à trouver et implémenter de nouvelles sources d...
Comment aider les entreprises à trouver et implémenter de nouvelles sources d...
 
Webinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise SecurityWebinar: Neues zur Splunk App for Enterprise Security
Webinar: Neues zur Splunk App for Enterprise Security
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
Whole Person Risk Modeling
Whole Person Risk ModelingWhole Person Risk Modeling
Whole Person Risk Modeling
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Presentación Ramachandran Narayanan/ Nisum - eCommerce Day Santiago 2017
Presentación Ramachandran Narayanan/ Nisum - eCommerce Day Santiago 2017Presentación Ramachandran Narayanan/ Nisum - eCommerce Day Santiago 2017
Presentación Ramachandran Narayanan/ Nisum - eCommerce Day Santiago 2017
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 
AR - Applying Big Data to Risk Management
AR - Applying Big Data to Risk ManagementAR - Applying Big Data to Risk Management
AR - Applying Big Data to Risk Management
 

Mehr von DataWorks Summit/Hadoop Summit

Unleashing the Power of Apache Atlas with Apache Ranger
Unleashing the Power of Apache Atlas with Apache RangerUnleashing the Power of Apache Atlas with Apache Ranger
Unleashing the Power of Apache Atlas with Apache RangerDataWorks Summit/Hadoop Summit
 
Enabling Digital Diagnostics with a Data Science Platform
Enabling Digital Diagnostics with a Data Science PlatformEnabling Digital Diagnostics with a Data Science Platform
Enabling Digital Diagnostics with a Data Science PlatformDataWorks Summit/Hadoop Summit
 
Double Your Hadoop Performance with Hortonworks SmartSense
Double Your Hadoop Performance with Hortonworks SmartSenseDouble Your Hadoop Performance with Hortonworks SmartSense
Double Your Hadoop Performance with Hortonworks SmartSenseDataWorks Summit/Hadoop Summit
 
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...DataWorks Summit/Hadoop Summit
 
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...DataWorks Summit/Hadoop Summit
 
Mool - Automated Log Analysis using Data Science and ML
Mool - Automated Log Analysis using Data Science and MLMool - Automated Log Analysis using Data Science and ML
Mool - Automated Log Analysis using Data Science and MLDataWorks Summit/Hadoop Summit
 
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...DataWorks Summit/Hadoop Summit
 
Scaling HDFS to Manage Billions of Files with Distributed Storage Schemes
Scaling HDFS to Manage Billions of Files with Distributed Storage SchemesScaling HDFS to Manage Billions of Files with Distributed Storage Schemes
Scaling HDFS to Manage Billions of Files with Distributed Storage SchemesDataWorks Summit/Hadoop Summit
 
How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors
How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors
How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors DataWorks Summit/Hadoop Summit
 

Mehr von DataWorks Summit/Hadoop Summit (20)

Running Apache Spark & Apache Zeppelin in Production
Running Apache Spark & Apache Zeppelin in ProductionRunning Apache Spark & Apache Zeppelin in Production
Running Apache Spark & Apache Zeppelin in Production
 
State of Security: Apache Spark & Apache Zeppelin
State of Security: Apache Spark & Apache ZeppelinState of Security: Apache Spark & Apache Zeppelin
State of Security: Apache Spark & Apache Zeppelin
 
Unleashing the Power of Apache Atlas with Apache Ranger
Unleashing the Power of Apache Atlas with Apache RangerUnleashing the Power of Apache Atlas with Apache Ranger
Unleashing the Power of Apache Atlas with Apache Ranger
 
Enabling Digital Diagnostics with a Data Science Platform
Enabling Digital Diagnostics with a Data Science PlatformEnabling Digital Diagnostics with a Data Science Platform
Enabling Digital Diagnostics with a Data Science Platform
 
Revolutionize Text Mining with Spark and Zeppelin
Revolutionize Text Mining with Spark and ZeppelinRevolutionize Text Mining with Spark and Zeppelin
Revolutionize Text Mining with Spark and Zeppelin
 
Double Your Hadoop Performance with Hortonworks SmartSense
Double Your Hadoop Performance with Hortonworks SmartSenseDouble Your Hadoop Performance with Hortonworks SmartSense
Double Your Hadoop Performance with Hortonworks SmartSense
 
Data Science Crash Course
Data Science Crash CourseData Science Crash Course
Data Science Crash Course
 
Apache Spark Crash Course
Apache Spark Crash CourseApache Spark Crash Course
Apache Spark Crash Course
 
Dataflow with Apache NiFi
Dataflow with Apache NiFiDataflow with Apache NiFi
Dataflow with Apache NiFi
 
Schema Registry - Set you Data Free
Schema Registry - Set you Data FreeSchema Registry - Set you Data Free
Schema Registry - Set you Data Free
 
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
Building a Large-Scale, Adaptive Recommendation Engine with Apache Flink and ...
 
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
Real-Time Anomaly Detection using LSTM Auto-Encoders with Deep Learning4J on ...
 
Mool - Automated Log Analysis using Data Science and ML
Mool - Automated Log Analysis using Data Science and MLMool - Automated Log Analysis using Data Science and ML
Mool - Automated Log Analysis using Data Science and ML
 
How Hadoop Makes the Natixis Pack More Efficient
How Hadoop Makes the Natixis Pack More Efficient How Hadoop Makes the Natixis Pack More Efficient
How Hadoop Makes the Natixis Pack More Efficient
 
HBase in Practice
HBase in Practice HBase in Practice
HBase in Practice
 
Breaking the 1 Million OPS/SEC Barrier in HOPS Hadoop
Breaking the 1 Million OPS/SEC Barrier in HOPS HadoopBreaking the 1 Million OPS/SEC Barrier in HOPS Hadoop
Breaking the 1 Million OPS/SEC Barrier in HOPS Hadoop
 
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
From Regulatory Process Verification to Predictive Maintenance and Beyond wit...
 
Backup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in Hadoop Backup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in Hadoop
 
Scaling HDFS to Manage Billions of Files with Distributed Storage Schemes
Scaling HDFS to Manage Billions of Files with Distributed Storage SchemesScaling HDFS to Manage Billions of Files with Distributed Storage Schemes
Scaling HDFS to Manage Billions of Files with Distributed Storage Schemes
 
How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors
How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors
How to Optimize Hortonworks Apache Spark ML Workloads on Modern Processors
 

Kürzlich hochgeladen

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Data Aggregation, Curation and analytics for security and situational awareness

  • 1. Copyright 2016 Prescient Holdings, LLC Bespoke Solutions for Data Curation, Analysis, Dissemination, and Visualization PrescientTraveler™ leverages decades of success in high-stakes intelligence operations, irregular warfare, crisis management, threat analysis, and complex systems design to keep international travelers safe. Purpose-built software and advanced analytic systems are used to aggregate, evaluate, distribute, and visualize threat and safety-related information. DATA AGGREGATION, CURATION, AND ANALYSIS FOR SAFETY SITUATIONAL AWARENESS SECURITY & Emergent Threat Detection and Incident Alerting  Continuous Monitoring of Asset-Threat Proximities  Venue-specific Threat and Business Continuity Assessments  Low-bandwidth, Secure Communications
  • 2. Copyright 2016 Prescient Holdings, LLC Bespoke Solutions for Data Curation, Analysis, Dissemination, and Visualization DATA AGGREGATION, CURATION, AND ANALYSIS FOR SAFETY SITUATIONAL AWARENESS SECURITY &Flexible Models and Processes Scalability High Availability (DR/HA) DEMANDS
  • 3. Copyright 2016 Prescient Holdings, LLC Bespoke Solutions for Data Curation, Analysis, Dissemination, and Visualization DATA AGGREGATION, CURATION, AND ANALYSIS FOR SAFETY SITUATIONAL AWARENESS SECURITY &Flexible Models and Processes Scalability High Availability (DR/HA) DEMANDS TECH-HUMAN BALANCE (FOR BUSINESS PERFORMANCE)
  • 4. Copyright 2016 Prescient Holdings, LLC
  • 5. Mobile App Features and Capabilities • Real-time threat alerts for your location & demographics • Real-Time tracking and monitoring of travelers • Country and City based reporting • Selected points of interest and safe sites Prescient Traveler Mobile Application Copyright 2016 Prescient Holdings, LLC
  • 6. While production analytics and operational data are managed on premises, autonomous failover to a remote data center (on a different segment of the national power grid) provides disaster resilience. High Performance, Availability, and Scalability were core design requirements. Copyright 2016 Prescient Holdings, LLC Failover Sites Real-time Worldview for Safety and Security Stakeholders sys·tem /ˈsistəm/ noun 1. a set of connected things or parts forming a complex whole.
  • 7. Copyright 2016 Prescient Holdings, LLC A Few Basic Questions that we all face What is the problem to be solved? Will the solution fit within a viable business model? What tools are best suited for the work to be done? How much is known, unknown but knowable, and unknowable? I.e. How complete is your model?
  • 8. Copyright 2016 Prescient Holdings, LLC A Few Basic Questions What is the problem to be solved? Improve Traveler Safety and Business Continuity Will the solution fit within a viable business model? Yes, with sufficient automation What tools are best suited for the work to be done? For Prescient: Hadoop, SAP HANA, MongoDB, NiFi How much is known, unknown but knowable, and unknowable? I.e. How complete is your model? Guestimate: 5%, 70%, 25%
  • 9. Copyright 2016 Prescient Holdings, LLC A Few Basic Questions What is the problem to be solved? Improve Traveler Safety and Business Continuity Will the solution fit within a viable business model? Yes, with sufficient automation What tools are best suited for the work to be done? For Prescient: Hadoop, SAP HANA, MongoDB, NiFi How much is known, unknown but knowable, and unknowable? I.e. How complete is your model? Guestimate: 5%, 70%, 25% Project Phase 1 2 3 We Are Here
  • 10. Copyright 2016 Prescient Holdings, LLC Deeper Questions How do you figure out what you know? Model → Ingest/Collect → Test → Refine → Repeat What must you do to convert unknowns in to knowns? Extract Signal from Noise What can you do to mitigate the risks created by the unknowable? Interpolate + Infer + Hypothesize How much is known, unknown but knowable, and unknowable? I.e. How complete is your model? Guestimate: 5%, 70%, 25% Inference PredictiveProject Phase 1 2 3 We Are Here
  • 11. Copyright 2016 Prescient Holdings, LLC Deeper Questions How do you figure out what you know? Model → Ingest/Collect → Test → Refine → Repeat What must you do to convert unknowns in to knowns? Extract Signal from Noise What can you do to mitigate the risks created by the unknowable? Interpolate + Infer + Hypothesize How much is known, unknown but knowable, and unknowable? I.e. How complete is your model? Guestimate: 5%, 70%, 25% Inference PredictiveProject Phase 1 2 3 We Are Here
  • 12. Copyright 2016 Prescient Holdings, LLC Entities of Special Interest & Foundational Concepts • Location – Geographic area characterized by cultural norms, taboos, and chronic or emergent threats • Traveler – Person with exploitable attributes, proximities to threats, and an associated risk profile • Itinerary – Traveler’s scheduled exposures to threats • Threat Parameterization – Proprietary process by which threat vectors are correlated with traveler attributes Partially expanded data models upon which linguistic, geospatial, and multi-variable analyses are performed using SAP HANA, Hadoop, and a variety of purpose-built tools. Hundreds of defined entities and the thousands of relationships between them permit, among other things: • Automated Entity Extraction for Threat Detection and Identification • Sentiment Analysis on Social Media and News Feeds • Threat-Proximity Alerting • Quantification of Exposure Across Threat Domains, Locations, and User Populations A small region of the PrescientTraveler™ Ontology Data Modeling for Advanced Analytics
  • 13. Locate, Curate, Organize, Analyze, and Produce Information that Helps Users stay safe and remain productive Asset profiles and itineraries are correlated with parameterized threats. Cultural and Safety Parity Assessments are performed for Home and Destination Locations. Myriad sources are curated then translated into risk-mitigating recommendations. Copyright 2016 Prescient Holdings, LLC ... + RSS Feeds + Social Media + Breaking News + Crime, Health, and Disaster Statistics + Economic Stability Indicators + ... Proprietary Interfaces, Applications, and Methods Copyright 2016 Prescient Holdings, LLC
  • 14. Below The Surface Advanced Tools for Big Data Aggregation and Analysis Event-Driven Realtime Copyright 2016 Prescient Holdings, LLC As of 08:00 CST on 24 JUNE 2016, a total of 48,217 distinct threat data sources had been indexed and ingested by the Prescient Platform PT API DB A BA B QGIS Proprietary Parsers PostGIS ArcMap SMART DATA ACCESS Locations of Interest, Profiles, Timelines REST API PrescientTraveler Applications Content Builder Dashboard Mobile MongoDB Data Curation Toolset (DCT with NiFi) REST API Client Authentication Examples of Realtime Alerts • Significant Environmental Events • Infrastructure Shortfalls • Civil Unrest • Terror Attacks • Emerging Pandemics • Geopolitical Instabilities RSS Social Media Local Sources Crime Stats Economic Data News Forums ... ... Public Bulletins Case Studies ...
  • 15. Copyright 2016 Prescient Holdings, LLC
  • 16. Copyright 2016 Prescient Holdings, LLC
  • 17. Copyright 2016 Prescient Holdings, LLC
  • 18. Copyright 2016 Prescient Holdings, LLC
  • 19. Copyright 2016 Prescient Holdings, LLC
  • 20. Copyright 2016 Prescient Holdings, LLC
  • 21. Copyright 2016 Prescient Holdings, LLC
  • 22. Copyright 2016 Prescient Holdings, LLC
  • 23. Copyright 2016 Prescient Holdings, LLC
  • 24. Copyright 2016 Prescient Holdings, LLC
  • 25.
  • 26. Copyright 2016 Prescient Holdings, LLC
  • 27. Copyright 2016 Prescient Holdings, LLC
  • 28. Copyright 2016 Prescient Holdings, LLC
  • 29. Copyright 2016 Prescient Holdings, LLC
  • 30. Copyright 2016 Prescient Holdings, LLC
  • 31. Copyright 2016 Prescient Holdings, LLC
  • 32. Copyright 2016 Prescient Holdings, LLC
  • 33. Copyright 2016 Prescient Holdings, LLC
  • 34. Copyright 2016 Prescient Holdings, LLC
  • 35. Copyright 2016 Prescient Holdings, LLC
  • 36. Protection of international travelers requires real- time, actionable data that is analyzed and simplified by human experts.We’re Prescient, and we’re humanizing intelligence. Copyright 2016 Prescient Holdings, LLC

Hinweis der Redaktion

  1. Information curation is one of PT’s key differentiators. Now other risk management firm is known to have invested in the technology (or talent) capable of: Entity extraction across multiple languages to automate logging of relevant events and alert Threat Watch Officers and Analysts accordingly. Perform complex geospatial analyses on Managed Big Data Provenance (source/origin metadata); early adopter of Apache Nifi (started as NSA project “Niagara Files;” multiple press releases from Apache foundation and Onyara)