SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Big Data for Cybersecurity
Mouaz Alnouri
25 March 2021
This Session will be recorded and posted on Skilledfield’s Youtube Channel
About me
I’m Mouaz Alnouri, the Managing Director of Skilledfield.
We help clients unleash the power of big data technology to detect cyber
security events and utilise automation to efficiently alert, escalate and
respond to security threats.
Technologist with years of experience in solving complex business
problems through creative client-centric strategies and value-driven
solutions. A change agent, capable of orchestrating a transformative
business strategy through data-driven decisions.
2
Mouaz leads the Skilledfield
team with an unrivalled passion
for data and a zest for problem
solving. With over a decade in
the IT services industry, he’s
provided intelligent solutions
for complex problems
throughout his career. He’s
worked with major technology
and telecommunications firms
including Telstra and NBN Co.
Limited, where he’s delivered
data focused solutions that
have significantly improved
operational efficiency. He’s a
customer-focused problem
solver that leads the Skilledfield
team towards their vision to
become Australia’s leading Big
Data solutions provider.
https://www.linkedin.com/in/malnouri/
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
What we are covering today
➔ One Slides about Skilledfield
➔ Why Cybersecurity is a Big Data use case
➔ How do we address Cybersecurity as Big Data Professionals
➔ How do we keep up with the emerging cyber threats
➔ Benefits of Big Data Technology for Cybersecurity
3
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
About Skilledfield: A Field of Skilled professionals!
4
Uplift Security Detection and
Response Capability
Uplift Observability Capability BI to AI Analytics Services
● Centralised Security Event
logging and auditing
● Endpoint Protection
● SOAR
● Advanced Security Analytics
● Managed Services
● Centralised Operational event
monitoring and alerting
● AIOps, (Artificial Intelligence for
IT operations)
● Managed Services
● Big Data Analytics using Elastic
● Big Data Analytics using
Databricks
● Big Data Analytics using
Microsoft Azure Services
Solving Complex Problems with Simplified Solutions
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Cybersecurity is Big Data Use Case
5
Volume
High amount of data
generated In terabytes
Velocity
Generated in real-time
in streams, batch or
bits
Variety
Structured,
Unstructured, Semi
structured
Big Data
Use Case
Protect
R
e
s
p
o
n
s
e
&
R
e
c
o
v
e
r
I
d
e
n
t
i
f
y
&
D
e
t
e
c
t
Assessment
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Detection Data Engineering Pipeline
6
Acquire Parse Enrich Analyse Alert
Sources
Tune
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Design Data Analytics Solution
● Comprehend business value chain
● Understand short-term and long-term goals and identify key
business questions
● Define analytics use cases
● Perform an initial assessment of data sources
● Design a solution
7
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Threat Modelling - PASTA (Risk Based)
8
Define
Objectives
Define
Technical
Scope
Application
Decomposition
Threat Analysis
Vulnerability &
Weakness
Analysis
Attack
Modelling
Risk & Impact
Analysis
The Process for Attack Simulation and Threat Analysis
https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf
Potential Threat: Identified, categorized, analysed, prioritise response
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Most Concerning Types of Cyber Threats
9
According to IT security decision makers worldwide as of November 2019. Source:
https://www.statista.com/statistics/500946/worldwide-leading-it-security-threats/
Malware is the most concerning cyberthreat
targeting organizations. Phishing and
ransomware were jointly ranked second.
Over the last two years, the number of insider
incidents has increased by 47%.
30 percent of malware attacks are zero day
exploits
Advanced attackers uniquely compile the
code they bring with them to specifically not
match anything they’ve used elsewhere or
ever will again
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Behavioural Analytics
10
Acquire Parse Enrich Analyse Alert
Sources
Tune
Learn Detect
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Same data. Different questions.
11
Ingest & prepare Alerting and Machine learning Detect, hunt, investigate
Ecosystem of network and host
data connectors used to
orchestrate your data feed from
edge devices.
Processing the data in real-time
and analysing it to identify
threats and detecting abnormal
behaviours.
Ad hoc queries at scale and
interactive threat hunting allows
a rapid event triage and
investigation.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
The DAMA Wheel
12
To use consistent words
and relations which
leads to more alignment
with current and future
requirements
Data lifecycle, data
integrity, data availability
and data usage
performance
Access control,
confidentiality and
regulatory compliance
Data Consolidation and
Data Movement
Endure effective and
efficient storage, retrieval
and use of data
Provide authoritative
source of reconciled and
quality-assessed data
Technical environment
and Technical and
Business Processes
Provide organisational
understanding of
business terms and
usages
Identify Data storage
and processing
requirements
Standards, requirements
and specifications for
data
Principles, policies,
procedures, metrics,
tools and responsibilities
for data management
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Skilledfield is Gold Sponsor for DAMA Australia
Our sponsorship in the Data Architecture and Data Security areas demonstrates our
commitment to the data community and our support for best practices. Our engineers
leverage the Data Management Body of Knowledge (DMBoK) to apply information and
data management best practices to enhance the business value of your Big Data.
13
The Data
Management
Association
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Unleash Big Data Technologies to Solve Complex CyberSecurity Problems
Uplift Security Detection and Response Capability
14
● Stop malware at the host, while enabling centralized visibility and advanced threat detection.
● Perform threat-modeling to understand the organization's defensive capabilities and develop customised detections
whilst tuning out false alerts to target genuine vulnerabilities.
● Collect, transform and store data from a broad set of systems including custom ones, build a strong track record of
transparency to inspect security measures and increase visibility.
● Implement fast, scalable, and relevant threat intelligence and data enrichment.
● Leverage machine learning to combat zero-day attacks.
● Organise SOC tasks and playbooks for automated analysis and response.
● Right size your solution including hosting, data throughput, licencing and operational resources.
Respond
Analyse
Detect
85% 30%
50%
of MSPs reported
attacks against SMBs
over the last two years.
of malware attacks
are zero-day exploits.
of security alerts are
false positives leading
to SOCs increasing
staff.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Protect your Organisation!
15
“It takes 20 years to build a reputation
and a few minutes of cyber-incident to
ruin it”
STEPHANE NAPPO
Global Head of Information Security for Société Générale International Banking & Financial Services
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
“A more secure
online world for
Australians, their
businesses and the
essential services
upon which we all
depend.”
Australia’s Cyber Security Strategy 2020
16
https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
● Invest $1.67 billion over 10 years
● New ways to investigate and shut
down cyber crime, including on the
dark web.
● Advice for small and medium
enterprises to increase their cyber
resilience.
● Clear guidance for businesses and
consumers about securing Internet of
Things devices.
● Improved community awareness of
cyber security threats.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Thank you!
info@skilledfield.com.au
17
https://skilledfield.com.au/
https://www.linkedin.com/company/skilled-field/
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel

Weitere ähnliche Inhalte

Was ist angesagt?

strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1
Carol Jackson
 

Was ist angesagt? (20)

Cloud computing for banking
Cloud computing for bankingCloud computing for banking
Cloud computing for banking
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)
 
Future of Big Data
Future of Big DataFuture of Big Data
Future of Big Data
 
Infrastructure Matters
Infrastructure MattersInfrastructure Matters
Infrastructure Matters
 
The Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent OffersThe Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent Offers
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Digital alpha technologies inc
Digital alpha technologies incDigital alpha technologies inc
Digital alpha technologies inc
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
 
Into the Big Data Future with Watson Analytics
Into the Big Data Future with Watson AnalyticsInto the Big Data Future with Watson Analytics
Into the Big Data Future with Watson Analytics
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1
 
Big Data & Analytics Day
Big Data & Analytics Day Big Data & Analytics Day
Big Data & Analytics Day
 
Solving Your Top IT Challenges
Solving Your Top IT Challenges Solving Your Top IT Challenges
Solving Your Top IT Challenges
 
The Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise ITThe Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise IT
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Machine learning in Banks
Machine learning in BanksMachine learning in Banks
Machine learning in Banks
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of Things
 
Virtual Reality in Financial Services (A Primer)
Virtual Reality in Financial Services (A Primer)Virtual Reality in Financial Services (A Primer)
Virtual Reality in Financial Services (A Primer)
 
Meetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learningMeetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learning
 

Ähnlich wie Big data for cybersecurity - skilledfield slides - 25032021

Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
stilliegeorgiana
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 

Ähnlich wie Big data for cybersecurity - skilledfield slides - 25032021 (20)

Meetup introduction to elastic stack - search at scale - skilledfield slide...
Meetup   introduction to elastic stack - search at scale - skilledfield slide...Meetup   introduction to elastic stack - search at scale - skilledfield slide...
Meetup introduction to elastic stack - search at scale - skilledfield slide...
 
Learnmystuff - Training Catalog
Learnmystuff - Training CatalogLearnmystuff - Training Catalog
Learnmystuff - Training Catalog
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Enterprise asset management industry whitepaper extract | "Asset intelligence...
Enterprise asset management industry whitepaper extract | "Asset intelligence...Enterprise asset management industry whitepaper extract | "Asset intelligence...
Enterprise asset management industry whitepaper extract | "Asset intelligence...
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Big Data Analytics_Unit1.pptx
Big Data Analytics_Unit1.pptxBig Data Analytics_Unit1.pptx
Big Data Analytics_Unit1.pptx
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout Overview
 
How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)
 

Kürzlich hochgeladen

CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
MarinCaroMartnezBerg
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 

Kürzlich hochgeladen (20)

CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 

Big data for cybersecurity - skilledfield slides - 25032021

  • 1. Big Data for Cybersecurity Mouaz Alnouri 25 March 2021 This Session will be recorded and posted on Skilledfield’s Youtube Channel
  • 2. About me I’m Mouaz Alnouri, the Managing Director of Skilledfield. We help clients unleash the power of big data technology to detect cyber security events and utilise automation to efficiently alert, escalate and respond to security threats. Technologist with years of experience in solving complex business problems through creative client-centric strategies and value-driven solutions. A change agent, capable of orchestrating a transformative business strategy through data-driven decisions. 2 Mouaz leads the Skilledfield team with an unrivalled passion for data and a zest for problem solving. With over a decade in the IT services industry, he’s provided intelligent solutions for complex problems throughout his career. He’s worked with major technology and telecommunications firms including Telstra and NBN Co. Limited, where he’s delivered data focused solutions that have significantly improved operational efficiency. He’s a customer-focused problem solver that leads the Skilledfield team towards their vision to become Australia’s leading Big Data solutions provider. https://www.linkedin.com/in/malnouri/ This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 3. What we are covering today ➔ One Slides about Skilledfield ➔ Why Cybersecurity is a Big Data use case ➔ How do we address Cybersecurity as Big Data Professionals ➔ How do we keep up with the emerging cyber threats ➔ Benefits of Big Data Technology for Cybersecurity 3 This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 4. About Skilledfield: A Field of Skilled professionals! 4 Uplift Security Detection and Response Capability Uplift Observability Capability BI to AI Analytics Services ● Centralised Security Event logging and auditing ● Endpoint Protection ● SOAR ● Advanced Security Analytics ● Managed Services ● Centralised Operational event monitoring and alerting ● AIOps, (Artificial Intelligence for IT operations) ● Managed Services ● Big Data Analytics using Elastic ● Big Data Analytics using Databricks ● Big Data Analytics using Microsoft Azure Services Solving Complex Problems with Simplified Solutions This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 5. Cybersecurity is Big Data Use Case 5 Volume High amount of data generated In terabytes Velocity Generated in real-time in streams, batch or bits Variety Structured, Unstructured, Semi structured Big Data Use Case Protect R e s p o n s e & R e c o v e r I d e n t i f y & D e t e c t Assessment This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 6. Detection Data Engineering Pipeline 6 Acquire Parse Enrich Analyse Alert Sources Tune This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 7. Design Data Analytics Solution ● Comprehend business value chain ● Understand short-term and long-term goals and identify key business questions ● Define analytics use cases ● Perform an initial assessment of data sources ● Design a solution 7 This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 8. Threat Modelling - PASTA (Risk Based) 8 Define Objectives Define Technical Scope Application Decomposition Threat Analysis Vulnerability & Weakness Analysis Attack Modelling Risk & Impact Analysis The Process for Attack Simulation and Threat Analysis https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf Potential Threat: Identified, categorized, analysed, prioritise response This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 9. Most Concerning Types of Cyber Threats 9 According to IT security decision makers worldwide as of November 2019. Source: https://www.statista.com/statistics/500946/worldwide-leading-it-security-threats/ Malware is the most concerning cyberthreat targeting organizations. Phishing and ransomware were jointly ranked second. Over the last two years, the number of insider incidents has increased by 47%. 30 percent of malware attacks are zero day exploits Advanced attackers uniquely compile the code they bring with them to specifically not match anything they’ve used elsewhere or ever will again This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 10. Behavioural Analytics 10 Acquire Parse Enrich Analyse Alert Sources Tune Learn Detect This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 11. Same data. Different questions. 11 Ingest & prepare Alerting and Machine learning Detect, hunt, investigate Ecosystem of network and host data connectors used to orchestrate your data feed from edge devices. Processing the data in real-time and analysing it to identify threats and detecting abnormal behaviours. Ad hoc queries at scale and interactive threat hunting allows a rapid event triage and investigation. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 12. The DAMA Wheel 12 To use consistent words and relations which leads to more alignment with current and future requirements Data lifecycle, data integrity, data availability and data usage performance Access control, confidentiality and regulatory compliance Data Consolidation and Data Movement Endure effective and efficient storage, retrieval and use of data Provide authoritative source of reconciled and quality-assessed data Technical environment and Technical and Business Processes Provide organisational understanding of business terms and usages Identify Data storage and processing requirements Standards, requirements and specifications for data Principles, policies, procedures, metrics, tools and responsibilities for data management This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 13. Skilledfield is Gold Sponsor for DAMA Australia Our sponsorship in the Data Architecture and Data Security areas demonstrates our commitment to the data community and our support for best practices. Our engineers leverage the Data Management Body of Knowledge (DMBoK) to apply information and data management best practices to enhance the business value of your Big Data. 13 The Data Management Association This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 14. Unleash Big Data Technologies to Solve Complex CyberSecurity Problems Uplift Security Detection and Response Capability 14 ● Stop malware at the host, while enabling centralized visibility and advanced threat detection. ● Perform threat-modeling to understand the organization's defensive capabilities and develop customised detections whilst tuning out false alerts to target genuine vulnerabilities. ● Collect, transform and store data from a broad set of systems including custom ones, build a strong track record of transparency to inspect security measures and increase visibility. ● Implement fast, scalable, and relevant threat intelligence and data enrichment. ● Leverage machine learning to combat zero-day attacks. ● Organise SOC tasks and playbooks for automated analysis and response. ● Right size your solution including hosting, data throughput, licencing and operational resources. Respond Analyse Detect 85% 30% 50% of MSPs reported attacks against SMBs over the last two years. of malware attacks are zero-day exploits. of security alerts are false positives leading to SOCs increasing staff. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 15. Protect your Organisation! 15 “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it” STEPHANE NAPPO Global Head of Information Security for Société Générale International Banking & Financial Services This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 16. “A more secure online world for Australians, their businesses and the essential services upon which we all depend.” Australia’s Cyber Security Strategy 2020 16 https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf ● Invest $1.67 billion over 10 years ● New ways to investigate and shut down cyber crime, including on the dark web. ● Advice for small and medium enterprises to increase their cyber resilience. ● Clear guidance for businesses and consumers about securing Internet of Things devices. ● Improved community awareness of cyber security threats. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel