SlideShare ist ein Scribd-Unternehmen logo
1 von 29
1© Cloudera, Inc. All rights reserved.
Preparing for
the Cybersecurity Renaissance
Futureproofing cybersecurity analysis
2© Cloudera, Inc. All rights reserved.
Agenda
• Housekeeping
• Introductions
• Presentation
• Live Q&A
3© Cloudera, Inc. All rights reserved.
Rocky DeStefano
Cloudera Subject Matter Expert,
Cybersecurity
4© Cloudera, Inc. All rights reserved.
Security Operations
Data left out of process
Expensive to scale systems
Proprietary tooling makes
difficult to implement new
Security Analysts
Out of the box analytics
Signature based is
yesterdays threat
Advanced analytics are add-ons
Security Responders
Data can take weeks to retrieve
Raw and historic data offline
Reactive instead of predictive
Challenges with traditional threat detection
5© Cloudera, Inc. All rights reserved.
Current state of cybersecurity
Aggregated
Events
Raw
System Logs
Network
Flows/ DNS
Full
Packet
Capture
Video,
Text, Images
User
Data
Data Types
(MBs>PBs)
SIEM
(TBs)
Search
Correlations
SQL
Machine Learning
Advanced Statistics
1
10
20
40
Time
(Months)
3
6© Cloudera, Inc. All rights reserved.
The shift to Apache Hadoop has already begun…
7© Cloudera, Inc. All rights reserved.
Powering the next generation of cybersecurity
Aggregated
Events
Raw
System Logs
Network
Flows/ DNS
Full
Packet
Capture
Video,
Text, Images
User
Data
Data Types
(MBs>PBs)
Search
Correlations
SQL
Machine Learning
Advanced Statistics
1
10
20
40
Time
(Months)
3
SIEM
(TBs)
Apache Hadoop Based Applications
(PB)
8© Cloudera, Inc. All rights reserved.
Enhanced Visibility, Depth and Coverage
Network
Flows
Sessions
PCAP
File
Executable
PDF
DOC
Endpoint
DLL
Processes
Memory
Context
Threat Intel
Context
Threat Intell
Vuln
Business
User
Admin
User
Service
Complete Enterprise Visibility
Logs
System
Network
Alerts
Applications
Mobile
Cloud
Enterprise
Process
Executable
9© Cloudera, Inc. All rights reserved.
Security Operations
Keep data online forever
Process larger volumes of
diverse data
Security Analysts
Native SQL, Statistical, Machine
Learning capabilities
Advanced Persistent Threat
detection
Security Responders
Make data accessible immediately
Provide raw and enriched
data access
Benefits of modern threat detection
10© Cloudera, Inc. All rights reserved.
Maturing cybersecurity
Detection
Primary Goals:
Reduce Time to Identification
Reduce Time to Response
Understand Impact
Benefits:
Maximize Effectiveness
Limit Impact / Reduce Risk
Better Decisions and Proactive Stance
These measurements will expose gaps in visibility, technology, training and process
as well as any misalignment with the business objectives.
11© Cloudera, Inc. All rights reserved.
Evolving cybersecurity analytic capabilities
ComplexityofDetection
Alerts Files
Commodity
Targeted
Search
Alerting
Incident Response
Hunting
Forensics
Validation
Compliance
Advanced
Insider
Logs Network Endpoint User
Information Sources
The ever increasing complexity of
attacks and the ever evolving
nature of our data and systems
forces a new approach to security.
There is an undisputable need for
more data and the equivalent
analytic flexibility to process that
data.
12© Cloudera, Inc. All rights reserved.
Summarizing The Keys to Effective Detection
Enterprise Visibility
Context
Speed
Analytics
Expertise
Complete instrumentation and access to all data. Endpoints, Networks,
Logs, Applications, Users, Files, etc
Asset Information, User Information, Threat Intelligence, Vulnerability,
Business Function, Systems/Application/Data Ownership and Criticality,
Adversaries adjust in seconds, Enterprises need to evolve at a similar
speed.
Access to all applicable data and the tools to analyze the data at scale,
across all timelines and with flexible analytic methods.
Security Analysis, ML, Forensics, Malware Reversing, Impact Assessment,
Enterprise Architecture, etc.
Process
Standardized, communicated, trained and robust enough to flex when
necessary.
13© Cloudera, Inc. All rights reserved.
The fastest, easiest, and most secure platform
Powerful Cluster Ops
Trusted by the pros
Cloud & Hybrid deployment
Integrated with AWS & Azure
Expert Support
Dedicated predictive support, just a click away
Easy to ManageFast for Business Security without Compromise
Enterprise Encryption
Protects everything transparently
Access Policy Enforcement
Full-stack row/column-based RBAC
& dynamic masking
Automated Data Management
Full-stack audit, lineage, discovery, and lifecycle
Real-Time Processing
Lowest latency, best concurrency
The Fastest Analytic SQL
Lowest latency, best concurrency
Machine Learning at Scale
Spark reduces ML processing time
14© Cloudera, Inc. All rights reserved.
Next generation cyber solutions choose Cloudera
15© Cloudera, Inc. All rights reserved.
Introducing Open Network Insight (ONI)
Apache 2.0 Licensed
• Apache Hadoop on Intel platform
delivers unrivaled analytic
performance and scale
• ONI open data models place customer
in control of the data unlocking
tremendous value
• ONI application framework accelerates
development and delivery of adjacent
use cases built on open data models
• Robust community
Network Endpoint
User /
Identity
Apache Hadoop
Intel Platform
16© Cloudera, Inc. All rights reserved.
Open Network Insight (ONI) V1.0
Apache 2.0 Licensed
ONI for cybersecurity
difference…
• Analyze billions of network events per
day leveraging machine learning in order
to detect unknown events, insider
attacks, and diagnose dark areas
• Reduce false positive alerts by
triangulating the data with context to
assure the alerts you receive are
legitimate
• Provide meaningful insights by analyzing
the data (e.g., flow, DNS packet) that is
already being collected
Port
143
IMAP
Port
143
IMAP
Use Case: Hidden Networks and Suspicious Connects
Identify the needle in the haystack
with patterns that provide insight into
potential threats.
How can I find the bad mixed in with all the good?
Human input helps the
system evolve. Quickly
eliminate false positives
from the lineup.
And make every item on
the list worth your time to
investigate.
Advanced
Analytics
Algorithms
Take action
Monitor
Ignore
Deliver suspicious
connections in ranked
order with multiple data
points such as time,
traffic flow, and more.
1
2
3
4
5
Port
80
HTTP
Suspicious!
18
Path to Enlightenment – ONI v 1.0
perimeter flows perimeter flows
+
DNS
perimeter flows
+
DNS
+
internal flows
(Stealthy) Scanning
Side-channel data escapes
Reflection attacks
Unusual data flows
Beaconing
DNS tunneling
Covert DNS channels
Internal DNS recon
Lateral movement
Complete threat visibility
19
From raw packets to the most actionable events
Operational
Analytics
Network
Flows
(nfcapd)
Parallel
Ingest
Framework
DNS
(pcap)
Machine
Learning
Sensors feed ONI
• Open Source Decoders
• Creates CSV and
Compressed data in HDFS
• Filters billions to
thousands
• Baseline not required
• Unsupervised, no rules
required
• Returns small number of
credible threats from
machine learning
• Visualization, Noise Filter,
Attack Heuristics
Each data source is a pipeline
– new pipelines can be added by following a short “recipe”
20© Cloudera, Inc. All rights reserved.
21© Cloudera, Inc. All rights reserved.
THE platform for cybersecurity analytics
Partner Benefit Customer Benefit
CDH on Intel Hardware - Leading edge capabilities
- Best developer support
- Fastest, easiest, most secure
platform
Open Network Insight (Apache 2.0
licensed)
- Accelerated time to market
- Invest in solution, not plumbing
- Data control and ownership
- Interoperable solutions
Cloudera Manager and Director - Built in solution deployment /
management / monitoring platform
- Simple, hybrid deployments
- Common console for all solutions
Customer and Partner Communities - Largest customer base - Most certified solutions
22© Cloudera, Inc. All rights reserved.
The Apache Software FoundationTM
2006 2008 2009 2010 2011 2012 Present
Core Hadoop
(HDFS, MR)
HBase
ZooKeeper
Core Hadoop
Hive
Pig
Mahout
HBase
ZooKeeper
Core Hadoop
Sqoop
Whirr
Avro
Hive
Pig
Mahout
HBase
ZooKeeper
Core Hadoop
Flume
Bigtop
Oozie
MRUnit
HCatalog
Sqoop
Whirr
Avro
Hive
Pig
Mahout
HBase
ZooKeeper
Spark
Impala
Solr
Kafka
Flume
Bigtop
Oozie
MRUnit
HCatalog
Sqoop
Whirr
Avro
Hive
Pig
Mahout
HBase
ZooKeeper
Parquet
Sentry
Spark
Impala
Solr
Kafka
Flume
Bigtop
Oozie
MRUnit
HCatalog
Sqoop
Whirr
Avro
Hive
Pig
Mahout
HBase
ZooKeeper
Core Hadoop
+YARN
Core Hadoop
+YARN
Core Hadoop
+YARN
Hadoop is so much more
than just Hadoop.
23© Cloudera, Inc. All rights reserved.
Our customers have
already seen success.
24© Cloudera, Inc. All rights reserved.
Consumer credit
provider building
detection models
using a full year of
comprehensive log
and indicator data
25© Cloudera, Inc. All rights reserved.
US Bank leveraging
user behavior
analytics to detect
fraud and inside
user threats
26© Cloudera, Inc. All rights reserved.
A US national security
organization identifies
potentially suspicious
activity across the
worldwide web, and
supply threat
information to 700
commercial and
federal organizations.
27© Cloudera, Inc. All rights reserved.
CRM provider using
comprehensive log
archive provides
immediate availability
to support
investigation
and mitigation
28© Cloudera, Inc. All rights reserved.
Live Q&A
Please enter your questions in the
chat box…
29© Cloudera, Inc. All rights reserved.
Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%Cloudera, Inc.
 
Turning Data into Business Value with a Modern Data Platform
Turning Data into Business Value with a Modern Data PlatformTurning Data into Business Value with a Modern Data Platform
Turning Data into Business Value with a Modern Data PlatformCloudera, Inc.
 
Big Data as Competitive Advantage in Financial Services
Big Data as Competitive Advantage in Financial ServicesBig Data as Competitive Advantage in Financial Services
Big Data as Competitive Advantage in Financial ServicesCloudera, Inc.
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedCloudera, Inc.
 
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Cloudera, Inc.
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
Spark and Deep Learning Frameworks at Scale 7.19.18
Spark and Deep Learning Frameworks at Scale 7.19.18Spark and Deep Learning Frameworks at Scale 7.19.18
Spark and Deep Learning Frameworks at Scale 7.19.18Cloudera, Inc.
 
From Insight to Action: Using Data Science to Transform Your Organization
From Insight to Action: Using Data Science to Transform Your OrganizationFrom Insight to Action: Using Data Science to Transform Your Organization
From Insight to Action: Using Data Science to Transform Your OrganizationCloudera, Inc.
 
Secure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersSecure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersCloudera, Inc.
 
Driving Better Products with Customer Intelligence

Driving Better Products with Customer Intelligence
Driving Better Products with Customer Intelligence

Driving Better Products with Customer Intelligence
Cloudera, Inc.
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Cloudera, Inc.
 
Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Cloudera, Inc.
 
Using Big Data to Transform Your Customer’s Experience - Part 1

Using Big Data to Transform Your Customer’s Experience - Part 1
Using Big Data to Transform Your Customer’s Experience - Part 1

Using Big Data to Transform Your Customer’s Experience - Part 1
Cloudera, Inc.
 
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...Cloudera, Inc.
 
Securing the Data Hub--Protecting your Customer IP (Technical Workshop)
Securing the Data Hub--Protecting your Customer IP (Technical Workshop)Securing the Data Hub--Protecting your Customer IP (Technical Workshop)
Securing the Data Hub--Protecting your Customer IP (Technical Workshop)Cloudera, Inc.
 
The Five Markers on Your Big Data Journey
The Five Markers on Your Big Data JourneyThe Five Markers on Your Big Data Journey
The Five Markers on Your Big Data JourneyCloudera, Inc.
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoopNiel Dunnage
 
High-Performance Analytics in the Cloud with Apache Impala
High-Performance Analytics in the Cloud with Apache ImpalaHigh-Performance Analytics in the Cloud with Apache Impala
High-Performance Analytics in the Cloud with Apache ImpalaCloudera, Inc.
 
End to End Streaming Architectures
End to End Streaming ArchitecturesEnd to End Streaming Architectures
End to End Streaming ArchitecturesCloudera, Inc.
 

Was ist angesagt? (20)

Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
 
Turning Data into Business Value with a Modern Data Platform
Turning Data into Business Value with a Modern Data PlatformTurning Data into Business Value with a Modern Data Platform
Turning Data into Business Value with a Modern Data Platform
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
Big Data as Competitive Advantage in Financial Services
Big Data as Competitive Advantage in Financial ServicesBig Data as Competitive Advantage in Financial Services
Big Data as Competitive Advantage in Financial Services
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
Spark and Deep Learning Frameworks at Scale 7.19.18
Spark and Deep Learning Frameworks at Scale 7.19.18Spark and Deep Learning Frameworks at Scale 7.19.18
Spark and Deep Learning Frameworks at Scale 7.19.18
 
From Insight to Action: Using Data Science to Transform Your Organization
From Insight to Action: Using Data Science to Transform Your OrganizationFrom Insight to Action: Using Data Science to Transform Your Organization
From Insight to Action: Using Data Science to Transform Your Organization
 
Secure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersSecure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game Changers
 
Driving Better Products with Customer Intelligence

Driving Better Products with Customer Intelligence
Driving Better Products with Customer Intelligence

Driving Better Products with Customer Intelligence

 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning

 
Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18
 
Using Big Data to Transform Your Customer’s Experience - Part 1

Using Big Data to Transform Your Customer’s Experience - Part 1
Using Big Data to Transform Your Customer’s Experience - Part 1

Using Big Data to Transform Your Customer’s Experience - Part 1

 
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
Optimized Data Management with Cloudera 5.7: Understanding data value with Cl...
 
Securing the Data Hub--Protecting your Customer IP (Technical Workshop)
Securing the Data Hub--Protecting your Customer IP (Technical Workshop)Securing the Data Hub--Protecting your Customer IP (Technical Workshop)
Securing the Data Hub--Protecting your Customer IP (Technical Workshop)
 
The Five Markers on Your Big Data Journey
The Five Markers on Your Big Data JourneyThe Five Markers on Your Big Data Journey
The Five Markers on Your Big Data Journey
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
High-Performance Analytics in the Cloud with Apache Impala
High-Performance Analytics in the Cloud with Apache ImpalaHigh-Performance Analytics in the Cloud with Apache Impala
High-Performance Analytics in the Cloud with Apache Impala
 
End to End Streaming Architectures
End to End Streaming ArchitecturesEnd to End Streaming Architectures
End to End Streaming Architectures
 

Andere mochten auch

Geecon - Improve your Android-fu with Kotlin
Geecon - Improve your Android-fu with KotlinGeecon - Improve your Android-fu with Kotlin
Geecon - Improve your Android-fu with KotlinNicolas Fränkel
 
Guión podcats: Alfabetización digital
Guión podcats: Alfabetización digital Guión podcats: Alfabetización digital
Guión podcats: Alfabetización digital Nadia3108
 
Jane's Presentation for May
Jane's Presentation for May Jane's Presentation for May
Jane's Presentation for May blogpwrpnt
 
Polychrome Testing: Ideas & Practices to Improve Software Testing | QASymphon...
Polychrome Testing: Ideas & Practices to Improve Software Testing | QASymphon...Polychrome Testing: Ideas & Practices to Improve Software Testing | QASymphon...
Polychrome Testing: Ideas & Practices to Improve Software Testing | QASymphon...QASymphony
 
Amazing Russian. Russian Alphabet
Amazing Russian. Russian AlphabetAmazing Russian. Russian Alphabet
Amazing Russian. Russian AlphabetOlga Jarrell
 
Airline traffic management analysis
Airline traffic management analysisAirline traffic management analysis
Airline traffic management analysisSumit Mendiratta
 
Mission to NARs with Apache NiFi
Mission to NARs with Apache NiFiMission to NARs with Apache NiFi
Mission to NARs with Apache NiFiHortonworks
 
ODPi 101: Who we are, What we do
ODPi 101: Who we are, What we doODPi 101: Who we are, What we do
ODPi 101: Who we are, What we doHortonworks
 
Streaming SQL w/ Apache Calcite
Streaming SQL w/ Apache Calcite Streaming SQL w/ Apache Calcite
Streaming SQL w/ Apache Calcite Hortonworks
 
Engaging with Cloudera & Morning Wrap Up
Engaging with Cloudera & Morning Wrap UpEngaging with Cloudera & Morning Wrap Up
Engaging with Cloudera & Morning Wrap UpCloudera, Inc.
 
RecordService for Unified Access Control
RecordService for Unified Access ControlRecordService for Unified Access Control
RecordService for Unified Access ControlCloudera, Inc.
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresCloudera, Inc.
 
Random Decision Forests at Scale
Random Decision Forests at ScaleRandom Decision Forests at Scale
Random Decision Forests at ScaleCloudera, Inc.
 
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...Cloudera, Inc.
 

Andere mochten auch (17)

Geecon - Improve your Android-fu with Kotlin
Geecon - Improve your Android-fu with KotlinGeecon - Improve your Android-fu with Kotlin
Geecon - Improve your Android-fu with Kotlin
 
Guión podcats: Alfabetización digital
Guión podcats: Alfabetización digital Guión podcats: Alfabetización digital
Guión podcats: Alfabetización digital
 
Codess dublin
Codess dublinCodess dublin
Codess dublin
 
Jane's Presentation for May
Jane's Presentation for May Jane's Presentation for May
Jane's Presentation for May
 
Polychrome Testing: Ideas & Practices to Improve Software Testing | QASymphon...
Polychrome Testing: Ideas & Practices to Improve Software Testing | QASymphon...Polychrome Testing: Ideas & Practices to Improve Software Testing | QASymphon...
Polychrome Testing: Ideas & Practices to Improve Software Testing | QASymphon...
 
Amazing Russian. Russian Alphabet
Amazing Russian. Russian AlphabetAmazing Russian. Russian Alphabet
Amazing Russian. Russian Alphabet
 
Airline traffic management analysis
Airline traffic management analysisAirline traffic management analysis
Airline traffic management analysis
 
Karel Vojkovsky
Karel VojkovskyKarel Vojkovsky
Karel Vojkovsky
 
Mission to NARs with Apache NiFi
Mission to NARs with Apache NiFiMission to NARs with Apache NiFi
Mission to NARs with Apache NiFi
 
ODPi 101: Who we are, What we do
ODPi 101: Who we are, What we doODPi 101: Who we are, What we do
ODPi 101: Who we are, What we do
 
Streaming SQL w/ Apache Calcite
Streaming SQL w/ Apache Calcite Streaming SQL w/ Apache Calcite
Streaming SQL w/ Apache Calcite
 
Engaging with Cloudera & Morning Wrap Up
Engaging with Cloudera & Morning Wrap UpEngaging with Cloudera & Morning Wrap Up
Engaging with Cloudera & Morning Wrap Up
 
Cáncer de Mama: Carcinomas triples negativos
Cáncer de Mama: Carcinomas triples negativosCáncer de Mama: Carcinomas triples negativos
Cáncer de Mama: Carcinomas triples negativos
 
RecordService for Unified Access Control
RecordService for Unified Access ControlRecordService for Unified Access Control
RecordService for Unified Access Control
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
 
Random Decision Forests at Scale
Random Decision Forests at ScaleRandom Decision Forests at Scale
Random Decision Forests at Scale
 
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
 

Ähnlich wie Preparing for the Cybersecurity Renaissance

Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionCloudera, Inc.
 
A Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsA Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsCloudera, Inc.
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudAmazon Web Services
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Niel Dunnage
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Marco Casassa Mont
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit  Splunk und QualysWebinar: Vulnerability Management leicht gemacht – mit  Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit Splunk und QualysGeorg Knon
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Simplifying Real-Time Architectures for IoT with Apache Kudu
Simplifying Real-Time Architectures for IoT with Apache KuduSimplifying Real-Time Architectures for IoT with Apache Kudu
Simplifying Real-Time Architectures for IoT with Apache KuduCloudera, Inc.
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture, MITDaveMillaar
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
 
Get started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionGet started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionCloudera, Inc.
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Ähnlich wie Preparing for the Cybersecurity Renaissance (20)

Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber Solution
 
A Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsA Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber Threats
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit  Splunk und QualysWebinar: Vulnerability Management leicht gemacht – mit  Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Information Security
Information SecurityInformation Security
Information Security
 
Simplifying Real-Time Architectures for IoT with Apache Kudu
Simplifying Real-Time Architectures for IoT with Apache KuduSimplifying Real-Time Architectures for IoT with Apache Kudu
Simplifying Real-Time Architectures for IoT with Apache Kudu
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
Get started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionGet started with Cloudera's cyber solution
Get started with Cloudera's cyber solution
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Mehr von Cloudera, Inc.

Partner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxPartner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxCloudera, Inc.
 
Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera, Inc.
 
2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards FinalistsCloudera, Inc.
 
Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Cloudera, Inc.
 
Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Cloudera, Inc.
 
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Cloudera, Inc.
 
Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Cloudera, Inc.
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Cloudera, Inc.
 
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Cloudera, Inc.
 
Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Cloudera, Inc.
 
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Cloudera, Inc.
 
Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Cloudera, Inc.
 
Extending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformExtending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformCloudera, Inc.
 
Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Cloudera, Inc.
 
Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Cloudera, Inc.
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Cloudera, Inc.
 
Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Cloudera, Inc.
 

Mehr von Cloudera, Inc. (20)

Partner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxPartner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptx
 
Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists
 
2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists
 
Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019
 
Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19
 
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
 
Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19
 
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
 
Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19
 
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
 
Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18
 
Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3
 
Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2
 
Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1
 
Extending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformExtending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the Platform
 
Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18
 
Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18
 
Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18
 

Kürzlich hochgeladen

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 

Kürzlich hochgeladen (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 

Preparing for the Cybersecurity Renaissance

  • 1. 1© Cloudera, Inc. All rights reserved. Preparing for the Cybersecurity Renaissance Futureproofing cybersecurity analysis
  • 2. 2© Cloudera, Inc. All rights reserved. Agenda • Housekeeping • Introductions • Presentation • Live Q&A
  • 3. 3© Cloudera, Inc. All rights reserved. Rocky DeStefano Cloudera Subject Matter Expert, Cybersecurity
  • 4. 4© Cloudera, Inc. All rights reserved. Security Operations Data left out of process Expensive to scale systems Proprietary tooling makes difficult to implement new Security Analysts Out of the box analytics Signature based is yesterdays threat Advanced analytics are add-ons Security Responders Data can take weeks to retrieve Raw and historic data offline Reactive instead of predictive Challenges with traditional threat detection
  • 5. 5© Cloudera, Inc. All rights reserved. Current state of cybersecurity Aggregated Events Raw System Logs Network Flows/ DNS Full Packet Capture Video, Text, Images User Data Data Types (MBs>PBs) SIEM (TBs) Search Correlations SQL Machine Learning Advanced Statistics 1 10 20 40 Time (Months) 3
  • 6. 6© Cloudera, Inc. All rights reserved. The shift to Apache Hadoop has already begun…
  • 7. 7© Cloudera, Inc. All rights reserved. Powering the next generation of cybersecurity Aggregated Events Raw System Logs Network Flows/ DNS Full Packet Capture Video, Text, Images User Data Data Types (MBs>PBs) Search Correlations SQL Machine Learning Advanced Statistics 1 10 20 40 Time (Months) 3 SIEM (TBs) Apache Hadoop Based Applications (PB)
  • 8. 8© Cloudera, Inc. All rights reserved. Enhanced Visibility, Depth and Coverage Network Flows Sessions PCAP File Executable PDF DOC Endpoint DLL Processes Memory Context Threat Intel Context Threat Intell Vuln Business User Admin User Service Complete Enterprise Visibility Logs System Network Alerts Applications Mobile Cloud Enterprise Process Executable
  • 9. 9© Cloudera, Inc. All rights reserved. Security Operations Keep data online forever Process larger volumes of diverse data Security Analysts Native SQL, Statistical, Machine Learning capabilities Advanced Persistent Threat detection Security Responders Make data accessible immediately Provide raw and enriched data access Benefits of modern threat detection
  • 10. 10© Cloudera, Inc. All rights reserved. Maturing cybersecurity Detection Primary Goals: Reduce Time to Identification Reduce Time to Response Understand Impact Benefits: Maximize Effectiveness Limit Impact / Reduce Risk Better Decisions and Proactive Stance These measurements will expose gaps in visibility, technology, training and process as well as any misalignment with the business objectives.
  • 11. 11© Cloudera, Inc. All rights reserved. Evolving cybersecurity analytic capabilities ComplexityofDetection Alerts Files Commodity Targeted Search Alerting Incident Response Hunting Forensics Validation Compliance Advanced Insider Logs Network Endpoint User Information Sources The ever increasing complexity of attacks and the ever evolving nature of our data and systems forces a new approach to security. There is an undisputable need for more data and the equivalent analytic flexibility to process that data.
  • 12. 12© Cloudera, Inc. All rights reserved. Summarizing The Keys to Effective Detection Enterprise Visibility Context Speed Analytics Expertise Complete instrumentation and access to all data. Endpoints, Networks, Logs, Applications, Users, Files, etc Asset Information, User Information, Threat Intelligence, Vulnerability, Business Function, Systems/Application/Data Ownership and Criticality, Adversaries adjust in seconds, Enterprises need to evolve at a similar speed. Access to all applicable data and the tools to analyze the data at scale, across all timelines and with flexible analytic methods. Security Analysis, ML, Forensics, Malware Reversing, Impact Assessment, Enterprise Architecture, etc. Process Standardized, communicated, trained and robust enough to flex when necessary.
  • 13. 13© Cloudera, Inc. All rights reserved. The fastest, easiest, and most secure platform Powerful Cluster Ops Trusted by the pros Cloud & Hybrid deployment Integrated with AWS & Azure Expert Support Dedicated predictive support, just a click away Easy to ManageFast for Business Security without Compromise Enterprise Encryption Protects everything transparently Access Policy Enforcement Full-stack row/column-based RBAC & dynamic masking Automated Data Management Full-stack audit, lineage, discovery, and lifecycle Real-Time Processing Lowest latency, best concurrency The Fastest Analytic SQL Lowest latency, best concurrency Machine Learning at Scale Spark reduces ML processing time
  • 14. 14© Cloudera, Inc. All rights reserved. Next generation cyber solutions choose Cloudera
  • 15. 15© Cloudera, Inc. All rights reserved. Introducing Open Network Insight (ONI) Apache 2.0 Licensed • Apache Hadoop on Intel platform delivers unrivaled analytic performance and scale • ONI open data models place customer in control of the data unlocking tremendous value • ONI application framework accelerates development and delivery of adjacent use cases built on open data models • Robust community Network Endpoint User / Identity Apache Hadoop Intel Platform
  • 16. 16© Cloudera, Inc. All rights reserved. Open Network Insight (ONI) V1.0 Apache 2.0 Licensed ONI for cybersecurity difference… • Analyze billions of network events per day leveraging machine learning in order to detect unknown events, insider attacks, and diagnose dark areas • Reduce false positive alerts by triangulating the data with context to assure the alerts you receive are legitimate • Provide meaningful insights by analyzing the data (e.g., flow, DNS packet) that is already being collected
  • 17. Port 143 IMAP Port 143 IMAP Use Case: Hidden Networks and Suspicious Connects Identify the needle in the haystack with patterns that provide insight into potential threats. How can I find the bad mixed in with all the good? Human input helps the system evolve. Quickly eliminate false positives from the lineup. And make every item on the list worth your time to investigate. Advanced Analytics Algorithms Take action Monitor Ignore Deliver suspicious connections in ranked order with multiple data points such as time, traffic flow, and more. 1 2 3 4 5 Port 80 HTTP Suspicious!
  • 18. 18 Path to Enlightenment – ONI v 1.0 perimeter flows perimeter flows + DNS perimeter flows + DNS + internal flows (Stealthy) Scanning Side-channel data escapes Reflection attacks Unusual data flows Beaconing DNS tunneling Covert DNS channels Internal DNS recon Lateral movement Complete threat visibility
  • 19. 19 From raw packets to the most actionable events Operational Analytics Network Flows (nfcapd) Parallel Ingest Framework DNS (pcap) Machine Learning Sensors feed ONI • Open Source Decoders • Creates CSV and Compressed data in HDFS • Filters billions to thousands • Baseline not required • Unsupervised, no rules required • Returns small number of credible threats from machine learning • Visualization, Noise Filter, Attack Heuristics Each data source is a pipeline – new pipelines can be added by following a short “recipe”
  • 20. 20© Cloudera, Inc. All rights reserved.
  • 21. 21© Cloudera, Inc. All rights reserved. THE platform for cybersecurity analytics Partner Benefit Customer Benefit CDH on Intel Hardware - Leading edge capabilities - Best developer support - Fastest, easiest, most secure platform Open Network Insight (Apache 2.0 licensed) - Accelerated time to market - Invest in solution, not plumbing - Data control and ownership - Interoperable solutions Cloudera Manager and Director - Built in solution deployment / management / monitoring platform - Simple, hybrid deployments - Common console for all solutions Customer and Partner Communities - Largest customer base - Most certified solutions
  • 22. 22© Cloudera, Inc. All rights reserved. The Apache Software FoundationTM 2006 2008 2009 2010 2011 2012 Present Core Hadoop (HDFS, MR) HBase ZooKeeper Core Hadoop Hive Pig Mahout HBase ZooKeeper Core Hadoop Sqoop Whirr Avro Hive Pig Mahout HBase ZooKeeper Core Hadoop Flume Bigtop Oozie MRUnit HCatalog Sqoop Whirr Avro Hive Pig Mahout HBase ZooKeeper Spark Impala Solr Kafka Flume Bigtop Oozie MRUnit HCatalog Sqoop Whirr Avro Hive Pig Mahout HBase ZooKeeper Parquet Sentry Spark Impala Solr Kafka Flume Bigtop Oozie MRUnit HCatalog Sqoop Whirr Avro Hive Pig Mahout HBase ZooKeeper Core Hadoop +YARN Core Hadoop +YARN Core Hadoop +YARN Hadoop is so much more than just Hadoop.
  • 23. 23© Cloudera, Inc. All rights reserved. Our customers have already seen success.
  • 24. 24© Cloudera, Inc. All rights reserved. Consumer credit provider building detection models using a full year of comprehensive log and indicator data
  • 25. 25© Cloudera, Inc. All rights reserved. US Bank leveraging user behavior analytics to detect fraud and inside user threats
  • 26. 26© Cloudera, Inc. All rights reserved. A US national security organization identifies potentially suspicious activity across the worldwide web, and supply threat information to 700 commercial and federal organizations.
  • 27. 27© Cloudera, Inc. All rights reserved. CRM provider using comprehensive log archive provides immediate availability to support investigation and mitigation
  • 28. 28© Cloudera, Inc. All rights reserved. Live Q&A Please enter your questions in the chat box…
  • 29. 29© Cloudera, Inc. All rights reserved. Thank you.

Hinweis der Redaktion

  1. HP ArcSight: https://www.protect724.hpe.com/docs/DOC-12978 Splunk (Hadoop Connect): http://www.splunk.com/en_us/solutions/solution-areas/big-data/splunk-hadoop-connect.html Export events from Splunk to Hadoop Browser directories and files in Hadoop Index data from Splunk in Hadoop for secure search, visualization, analytics Qradar: https://www.ibm.com/.../Integrating_QRadar_with_Hadoop.pdf
  2. A starting point on files: PDF EXE JAVA PCAP PE Files RAR ZIP SWF MS Office RTF MHTML YARA Mach-O XOR
  3. Every Hadoop platform gives you scalability and flexibility. Cloudera makes Hadoop fast, easy, and secure. Trap Questions: Spark: What matters to you in supporting Spark and Hadoop? Impala: How many BI users will you have? What additional budget have you allocated for Hive? Kudu: How do you plan to address operational data warehouse / time series use cases? Cloudera Navigator Optimizer: How do you know what data should be in Hadoop vs existing systems? Trap Questions: Cloudera Manager: How much downtime are you willing to accept during an upgrade? What if your operations tools fail during an outage? What does your team need to debug critical and latent issues? Cloudera Director: Where is your data being created? How do you plan to manage across environments? Are you prepared to train staff on both Amazon and on-premises Hadoop platforms? Expert Support: How can a core R&D group simultaneously respond to frequent customer issues and also build a culture of innovation? [only Cloudera has a back-line support team to address issues without bringing in R&D] Trap Questions: Navigator Encrypt/KeyTrustee: What is the impact of an information leak from intermediate MR results, log files, etc? Sentry/RecordService: How are you planning to secure access to sensitive data across Hive and Spark? Navigator: Do your governance needs extend beyond Hive? Manager: How will you keep end users from damaging your production environments?
  4. Merge slide 12 and 10 without categorization on the vendors
  5. Cybersecurity application framework Abnormal traffic patterns analyzing network flow and dns with machine learning Open data models for network Community to extend
  6. Find the needle in the haystack. Note: slideshow mode builds image in the following sequence: 1.       You can see all the connections, but which are suspicious? 2.       Netflow data is sent through the advanced algorithms 3.       The algorithms identify the most likely candidates for further investigation 4.       The suspicious connections are ranked and given to a human to analyze 5.       The human determines what actions to take toward each item 6.       Feedback then makes the system grow smarter and more useful
  7. Misconfigurations, network problems you didn’t know about. Security and misconfigurations account for an enormous part of what they do. Its all fire fighting. Things are either operational or security not both.
  8. First and foremost we have the Apache Hadoop community. This ever growing community continues to grow as Hadoop continues to expand out of just batch storage and processing. As more businesses continue to use Hadoop, more use cases continue to emerge creating additional projects that allow for more robust data applications. With Hadoop you don’t just get the code your team built, you get the code the community built.
  9. Link to account record in SFDC (for Cloudera employees only): https://na6.salesforce.com/0018000000oqdOF?srPos=0&srKp=001 A national security organization in the US offers real-time information, warnings and guidelines that strengthen our ability to protect against cyber attacks. Background: In today’s digital world, cyber security is a serious effort. A US national security organization is tasked with identifying potentially suspicious activity across the worldwide web, and they must make that information available to 700 commercial and federal organizations. Challenge: More data lends itself to more accurate predictions, so logically the organization has been collecting massive volumes of cyber data in order to prevent cyber attacks. But their incumbent IBM Netezza environment was hitting scalability and performance limitations. Solution: The organization deployed a Cloudera Enterprise platform with Sherpasurfing, an open source cyber security solution created by Six3 Systems. Cloudera runs data processing, staging and storage; the Cloudera environment is integrated with Netezza which performs analytics. The system is also integrated with HP ArcSite, Tableau and Centrifuge. Hadoop components in use include Accumulo, Hive, Flume, MapReduce and Sqoop. This organization is growing their Cloudera cluster to 100 PB. Results: Since deploying Cloudera alongside Netezza, this organization can offer real-time information and warnings to other government organizations. They can also now show rich information on major malware outbreaks and provide guidelines to strengthen organizations’ protection against cyber attacks -- this is a net new capability that resulted from their Cloudera deployment.