SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Haystax Enterprise Threat
Management
Bryan S. Ware, CTO
A Look Toward the Future of Advanced Analytics
and Their Application to Threat Detection &
Action
February 19, 2015
1
Enterprise Threat Management
and Cybersecurity Solutions
FORMED in 2012 on a 20 year legacy
(Digital Sandbox, FlexPoint, NetCentrics)
EMPLOYEES: 350, 90% Cleared
THOUGHT LEADERS IN:
Advanced Threat Analytics, Network
Management and Cybersecurity
2
“The Data is the Model”
As computing and network are increasingly cheap…
And more and more sensors are generating data on everything…
Analytics can be harnessed to derive insight, predict the future,
etc.
If it works for Google, it should for intelligence right?
The Present Big Data Era
3
What do you do when:
• The past is not necessarily representative of the future
• The threat event has never occurred (or too infrequently for
traditional statistics)
• The quality of the signal data is poor
• You must account for causality or the sequence of events
• You must provide legally or analytically defensible results
Where does this apply?
• Terrorism risk and natural catastrophe risk management
• Insider threat detection, cyber threat intelligence
• Political instability, expropriation of assets, economic and
financial risk forecasting
The Next Frontier
4
“The information you have is not the information you
want. The information you want is not the information
you need. The information you need is not the
information you can obtain. The information you can
obtain costs more than you want to pay”
Peter L. Bernstein
Against the Gods: The
Remarkable Story of
Risk
5
The Haystax Way – Multiple Patents for Risk Management
and Detecting Emergent Threat Activity
We model first
Models represent human judgment
Disparate information sources are fused
Causality and uncertainty are measured
Outputs represent the degree of belief
The Haystax Technology Vision
Enterprise Threat Management
Haystax will provide CROs, CIOs, and CISOs with a
cloud-enabled platform to identify, monitor, and manage
potential threats to the enterprise in an integrated,
analytic system.
7
What are all my
assets?
‣ Facilities
‣ People
‣ Network Assets
‣ Missions and Programs
‣ Response Capabilities
What threats and
hazards are likely?
‣ What threats are plausible?
‣ What are the most likely
issues to occur?
‣ Security Threats
‣ Natural Hazards
‣ Accidents and Incidents
What
vulnerabilities
could be
exploited?
‣ What is the impact of a
threat exploiting a
vulnerability?
‣ Human
‣ Economic
‣ Mission
‣ Psychological
What
consequences or
impacts would
occur?
‣ What vulnerabilities can a
threat exploit?
‣ What measures are in place
to reduce those
vulnerabilities?
Enterprise Threat Management – Analytic Framework
8
Low Priority Channels
Data Collection
& Pre-Processing
Analytic
Processing
Archive DB Web
Mobile
3rd Party
Visual Interaction CanvasesAlerts Reports
MapTriage Timeline
Action
News & Social
Feeds
Enterprise
Communications
Network Alerts
Suspicious
Activity Reports.
Access Control
Alarms HR Data
Data from all available sources are processed and
routed for action
ANALYTICS FOR INSIDER THREAT
9
10
The Signal to Noise Problem…
Teaching the detection system to find the target (an
airplane here) seems quite easy….
But in practice it’s very hard to precisely define what
the target looks like, and how it’s different from
other clutter.
Target
False Alarm
11
The Signal to Noise Problem…
And it gets much, much harder…
Target
False Alarm
Miss
12
The Signal to Noise Problem…
Simple rules (thresholds or flags) will identify the
obvious spikes…. But will miss weak signals.
Lowering thresholds
will increase false
alarms.
How do you strike a balance between False Alarm
Rate and Missed Detections?
13
The Signal has Become the Noise
14
What is Carbon?
Counterintelligence
Medical
Criminal Investigators
HUMINT
Family
Peers
Psych
Subject
Command
ITSecurity
Carbon is a model of the Whole Person, establishing a Pattern of Life
that is evaluated continuously as data changes or becomes available.
Backgroun
d Check
Peers &
Family
$
Financial
Records Public
Records
HR
Record
Web and Social
Media
Network
15
Counterintelligence
Medical
Criminal Investigators
HUMINT
Family
Peers
Psych
Subject
Command
ITSecurity
Backgroun
d Check
Peers &
Family
$
Financial
Records Public
Records
HR
Record
Web and Social
Media
+ =
Experts Data
Continuously
prioritized risk based
ranking
How Carbon Works
MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS
EVALUATION = AUTOMATED THREAT AWARENESS
Networ
k
16
Anticipation trumps forensics
17
How Does the Carbon Software Work?
Installed on premises, and connected to
enterprise data sources
Calculates the level of risk of each person in
the organization
Provides a dashboard of all personnel
Maintains information and cases on personnel
Alerts when significant issues or changes are
detected
Is updated dynamically and continuously as
information changes or more information and
new data sources are identified
Thank You
Bryan S. Ware
Chief Technology Officer
For Additional
Information Contact:
bware@haystax.com
(703) 431-7127

Weitere ähnliche Inhalte

Was ist angesagt?

Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityEMC
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax TechnologyHaystax Technology
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research UpdateGridCyberSec
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Coastal Pet Products, Inc.
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringBooz Allen Hamilton
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive SecurityComputerworld Philippines
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionTripwire
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsBrian Rushton-Phillips
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkInterset
 
Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationJaffrey Ali
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 

Was ist angesagt? (20)

Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Enterprise Threat Management
Enterprise Threat ManagementEnterprise Threat Management
Enterprise Threat Management
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less Work
 
Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium Presentation
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 

Andere mochten auch

Horror make up
Horror make upHorror make up
Horror make upkiller987
 
Modelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencionModelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencionJuan Contreras
 
Ahuakate hezurretik abiatuz...
Ahuakate hezurretik abiatuz...Ahuakate hezurretik abiatuz...
Ahuakate hezurretik abiatuz...Aiturbieta
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Technology
 
StimulusWk13
StimulusWk13StimulusWk13
StimulusWk13Aj Cruz
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015SpondaPlc
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016SpondaPlc
 
Mega Holdings prasentation
Mega Holdings prasentationMega Holdings prasentation
Mega Holdings prasentationenverayyildiz
 
facebook m
facebook mfacebook m
facebook mMoya01
 
Sponda Results presentation Q4 2015
Sponda Results presentation Q4 2015Sponda Results presentation Q4 2015
Sponda Results presentation Q4 2015SpondaPlc
 
Sponda yleisesitys 31032014
Sponda yleisesitys 31032014Sponda yleisesitys 31032014
Sponda yleisesitys 31032014SpondaPlc
 
Historia 10 suurinta jackpottia
Historia 10 suurinta jackpottiaHistoria 10 suurinta jackpottia
Historia 10 suurinta jackpottiaCasinoLehti
 
Freedom Health interview questions and answers
Freedom Health interview questions and answersFreedom Health interview questions and answers
Freedom Health interview questions and answerstaylorlorr
 
First class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26thFirst class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26thUniversidad Virtual Liverpool
 

Andere mochten auch (20)

Horror make up
Horror make upHorror make up
Horror make up
 
Modelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencionModelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencion
 
Ahuakate hezurretik abiatuz...
Ahuakate hezurretik abiatuz...Ahuakate hezurretik abiatuz...
Ahuakate hezurretik abiatuz...
 
Comparatives and Superlatives
Comparatives and SuperlativesComparatives and Superlatives
Comparatives and Superlatives
 
Drupal commerce
Drupal commerceDrupal commerce
Drupal commerce
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
 
StimulusWk13
StimulusWk13StimulusWk13
StimulusWk13
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016
 
Mega Holdings prasentation
Mega Holdings prasentationMega Holdings prasentation
Mega Holdings prasentation
 
facebook m
facebook mfacebook m
facebook m
 
Sponda Results presentation Q4 2015
Sponda Results presentation Q4 2015Sponda Results presentation Q4 2015
Sponda Results presentation Q4 2015
 
Sponda yleisesitys 31032014
Sponda yleisesitys 31032014Sponda yleisesitys 31032014
Sponda yleisesitys 31032014
 
Guía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodoGuía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodo
 
American mfg
American mfgAmerican mfg
American mfg
 
Historia 10 suurinta jackpottia
Historia 10 suurinta jackpottiaHistoria 10 suurinta jackpottia
Historia 10 suurinta jackpottia
 
Freedom Health interview questions and answers
Freedom Health interview questions and answersFreedom Health interview questions and answers
Freedom Health interview questions and answers
 
First class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26thFirst class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26th
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
 
Shooting
Shooting Shooting
Shooting
 

Ähnlich wie The Future of Advanced Analytics

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?dianadvo
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersThe Lorenzi Group
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookDeloitte Canada
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability Resolver Inc.
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 

Ähnlich wie The Future of Advanced Analytics (20)

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 

Mehr von Haystax Technology

Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentHaystax Technology
 
The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platformHaystax Technology
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Haystax Technology
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax Technology
 

Mehr von Haystax Technology (10)

Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk Assessment
 
The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
 
School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
 
Major events
Major eventsMajor events
Major events
 
Public safety cloud overview
Public safety cloud overviewPublic safety cloud overview
Public safety cloud overview
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
 
Haystax bayesian networks
Haystax bayesian networksHaystax bayesian networks
Haystax bayesian networks
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paper
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

The Future of Advanced Analytics

  • 1. Haystax Enterprise Threat Management Bryan S. Ware, CTO A Look Toward the Future of Advanced Analytics and Their Application to Threat Detection & Action February 19, 2015
  • 2. 1 Enterprise Threat Management and Cybersecurity Solutions FORMED in 2012 on a 20 year legacy (Digital Sandbox, FlexPoint, NetCentrics) EMPLOYEES: 350, 90% Cleared THOUGHT LEADERS IN: Advanced Threat Analytics, Network Management and Cybersecurity
  • 3. 2 “The Data is the Model” As computing and network are increasingly cheap… And more and more sensors are generating data on everything… Analytics can be harnessed to derive insight, predict the future, etc. If it works for Google, it should for intelligence right? The Present Big Data Era
  • 4. 3 What do you do when: • The past is not necessarily representative of the future • The threat event has never occurred (or too infrequently for traditional statistics) • The quality of the signal data is poor • You must account for causality or the sequence of events • You must provide legally or analytically defensible results Where does this apply? • Terrorism risk and natural catastrophe risk management • Insider threat detection, cyber threat intelligence • Political instability, expropriation of assets, economic and financial risk forecasting The Next Frontier
  • 5. 4 “The information you have is not the information you want. The information you want is not the information you need. The information you need is not the information you can obtain. The information you can obtain costs more than you want to pay” Peter L. Bernstein Against the Gods: The Remarkable Story of Risk
  • 6. 5 The Haystax Way – Multiple Patents for Risk Management and Detecting Emergent Threat Activity We model first Models represent human judgment Disparate information sources are fused Causality and uncertainty are measured Outputs represent the degree of belief
  • 7. The Haystax Technology Vision Enterprise Threat Management Haystax will provide CROs, CIOs, and CISOs with a cloud-enabled platform to identify, monitor, and manage potential threats to the enterprise in an integrated, analytic system.
  • 8. 7 What are all my assets? ‣ Facilities ‣ People ‣ Network Assets ‣ Missions and Programs ‣ Response Capabilities What threats and hazards are likely? ‣ What threats are plausible? ‣ What are the most likely issues to occur? ‣ Security Threats ‣ Natural Hazards ‣ Accidents and Incidents What vulnerabilities could be exploited? ‣ What is the impact of a threat exploiting a vulnerability? ‣ Human ‣ Economic ‣ Mission ‣ Psychological What consequences or impacts would occur? ‣ What vulnerabilities can a threat exploit? ‣ What measures are in place to reduce those vulnerabilities? Enterprise Threat Management – Analytic Framework
  • 9. 8 Low Priority Channels Data Collection & Pre-Processing Analytic Processing Archive DB Web Mobile 3rd Party Visual Interaction CanvasesAlerts Reports MapTriage Timeline Action News & Social Feeds Enterprise Communications Network Alerts Suspicious Activity Reports. Access Control Alarms HR Data Data from all available sources are processed and routed for action
  • 11. 10 The Signal to Noise Problem… Teaching the detection system to find the target (an airplane here) seems quite easy…. But in practice it’s very hard to precisely define what the target looks like, and how it’s different from other clutter. Target False Alarm
  • 12. 11 The Signal to Noise Problem… And it gets much, much harder… Target False Alarm Miss
  • 13. 12 The Signal to Noise Problem… Simple rules (thresholds or flags) will identify the obvious spikes…. But will miss weak signals. Lowering thresholds will increase false alarms. How do you strike a balance between False Alarm Rate and Missed Detections?
  • 14. 13 The Signal has Become the Noise
  • 15. 14 What is Carbon? Counterintelligence Medical Criminal Investigators HUMINT Family Peers Psych Subject Command ITSecurity Carbon is a model of the Whole Person, establishing a Pattern of Life that is evaluated continuously as data changes or becomes available. Backgroun d Check Peers & Family $ Financial Records Public Records HR Record Web and Social Media Network
  • 16. 15 Counterintelligence Medical Criminal Investigators HUMINT Family Peers Psych Subject Command ITSecurity Backgroun d Check Peers & Family $ Financial Records Public Records HR Record Web and Social Media + = Experts Data Continuously prioritized risk based ranking How Carbon Works MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS EVALUATION = AUTOMATED THREAT AWARENESS Networ k
  • 18. 17 How Does the Carbon Software Work? Installed on premises, and connected to enterprise data sources Calculates the level of risk of each person in the organization Provides a dashboard of all personnel Maintains information and cases on personnel Alerts when significant issues or changes are detected Is updated dynamically and continuously as information changes or more information and new data sources are identified
  • 20. Bryan S. Ware Chief Technology Officer For Additional Information Contact: bware@haystax.com (703) 431-7127

Hinweis der Redaktion

  1. A Look Toward the Future of Advanced Analytics and Their Application to Threat Detection and Action 1)“whole person risk modeling” 2)“anticipation trumps forensics” 3) “prioritized response”
  2. “The information you have is not the information you want. The information you want is not the information you need. The information you need is not the information you can obtain. The information you can obtain costs more than you want to pay” ― Peter L. Bernstein, Against the Gods: The Remarkable Story of Risk
  3. Why Haystax is unique?
  4. The next three slides including this one all have ETM as the header (should probably edit) Also the headers should have consistent font type and size? This slide is a complete design departure, do you really want that? Great opportunity for discussion? how does this map to their enterprises? What about this appealing? What about this is concerning?
  5. The data outside the four walls looks like a unique attribute (are there others?) The constellation platform is the result of our R&D efforts over the last 10 years! It’s built using the most modern open source analytic technologies – we are using the same frameworks that products like Twitter and facebook use…it’s all proven. In some cases we had to optimize the technologies to make it do what we wanted. The most important thing is that Constellation is ready to use. It isn’t something we build from scratch for our customers. It just works…. How does it work? That’s the section in the middle Finally, we present the information through defined visual canvases. What is important to remember is that the end user does not need to do anything to generate these views. So how is this used?
  6. This is where we talk about ACES pilot results, recent AAG results
  7. Keep tight – hit theme(s) Focus on the differentiation created by the distillation/incorporation of experts
  8. Great slide to hit theme(s) You also made a point about the third tier being the most important but I don’t recall why? Likely an important idea tied to theme(s) Let’s look at it from the position of decision makers: Starting with an analyst. We are looking at three screens that show analytic fusion from Constellation… You can explain the text…
  9. Haystax R&D Has conducted significant research into data sources, sensors, behaviors, and analytics for insider threat detection and analysis Developed tools to create new models, ingest new data sources, model network behaviors, and simulate risk events.