SlideShare a Scribd company logo
1 of 19
Graphs for
Cybersecurity
‘HACKED’
Threats and
Trends
Power of Connected
Data
Dr. Jim Webber, Chief Scientist
300% Increase
In Cybercrime reported by FBI since the
pandemic began- “IMC Group”
630% Rise
In cloud-based cyber attacks between
Jan-Apr, 2020- “Fintech News”
420% Rise
Is the %age of supply chain attacks
grew in last 12 months
- “Sonatype”
238% Rise
In crime on banks in 2020. 27% of COVID-19
cyberattacks targeted banks or healthcare
organizations - “Fintech News”
Cybersecurity in the Time of Pandemic
95% 88%
68% 86%
Organizations Worldwide
experienced Spear Phishing
Attempts in 2019 -”Proofpoint”
Breaches were Financially
Motivated and 10% motivated
by espionage -”Verizon”
Cybersecurity Breaches are
Caused by Human Error
“Cybint”
Business Leaders Feel their
Cybersecurity Risks are
Increasing - “Accenture”
State of Cybersecurity Readiness
The Economics of Cybersecurity
$10.5
Trillion
$170.4
Billion
$3.86
Million
$403
Billion
The worldwide information
security market is forecast to
reach by 2022- “Gartner”
Cybersecurity market
forecasted to be worth by
2027- “CE Pro”
Cybercrime will cost the world
annually by 2025-
“Cybersecurityventures”
Average cost of a data breach
as of 2020- “IBM”
HACKING
STATS
The average time to identify a
breach in 2020 - “IBM”
207 Days
US nationals don’t know what
steps to take; in the event of a
data breach - “Varonis”
56%
Breaches in 2020 involved
personal data - “Verizon”
58%
US nationals have never
checked if they were affected
by a data breach - “Varonis”
64%
THREATS
&
TRENDS
Malwares increased in 2020 -
“Help Net Security”
358%
The total number of DDoS
attacks worldwide by 2023 -
“Cisco”
15.4 Million
The average Ransomware
payment rose in 2020 - “Fintech
News”
33%
Reported security attacks are
related to Phishing
- “CSO Online”
80%
Top 10 Trends in Data and Analytics, 11 May
2020, Rita Sallam et al.
“Defenders think in lists, Attackers think in
graphs, as long as this is true attackers win”
- John Lambert, Distinguished Engineer, Vice President, Microsoft Threat Intelligence Center
Protect
Systems, services, and crown jewels
Detect
Anomalies in real-time
Recover
Quickly in the event of incidents
Respond
Rapidly with confidence to minimize impact
So, Why Do We Need Graphs to Solve
Cybersecurity Problem?
A Holistic view 🡪 Connected Data
Connections in Data are as
Valuable as the Data Itself
Networks of People Transaction Networks
Bought
B
o
u
g
h
t
V
i
e
w
e
d
R
e
t
u
r
n
e
d
Bought
Knowledge Networks
P
l
a
y
s
Lives_in
In_sport
Likes
F
a
n
_
o
f
Plays_for
E.g., Risk management, Supply
chain, Payments
E.g., Employees, Customers,
Suppliers, Partners, Influencers
E.g., Enterprise content, Domain
specific content, eCommerce
content
K
n
o
w
s
Knows
Knows
K
n
o
w
s
11
Connections are Core to
Modern, Intelligent Applications
Personalization
Product Recommendations
Personalized Health
Media and Advertising
Decision Analysis
Fraud Prevention
Network Analysis
Forecasting
Massive
Data Integration
Customers/Data 360
Compliance
Optimize Operations
Data Science
AI & ML
Behavior Prediction
Patient/Customer Journey
Disambiguation
Data Driven
Discovery & Innovation
Drug Discovery
Intelligence & Security
Product & Process Innovation
Data Analysis
7/10
20/25
7/10
Top Retail Firms
Top Financial Firms
Top Software Vendors
Anyway You Like It
Neo4j - The Graph Company
The Industry’s Largest Dedicated Investment in Graphs
12
Creator of the Property
Graph
Thousands of Customers
World-Wide
HQ in Silicon Valley, offices
include London, Munich,
Paris & Malmo
Industry Leaders use Neo4j
On-Prem
DB-as-a-Service
In the Cloud
1
3
Graphs Lightspeed Adoption: Neo4j
~800
Enterprise
Customers
Customer Obsession
80
New Enterprise Customers
added in 2020
Recognized as a Leader in The
Forrester Wave™ for Graph Data
Platforms
First Graph ML for
Enterprise
~2000
Startups
1
4
Graphs Lightspeed Adoption: Neo4j
Graph database is the fastest growing DBMS category, and Neo4j is
the Leader
Developers
200k+
Meetups
72k+
Graph Database
(DB-Engines)
#1
Database
(DB-Engines)
Top 20
Neo4j Downloads
2.0 Mil
Docker Pulls
144 Mil
Deployment in the Cloud
90%+
The Neo4j Graph Platform
15
Development
& Administration
Analytics
Tooling
BUSINESS USERS
DEVELOPERS
ADMINS
Graph
Analytics
Graph
Transactions
Data Integration
Discovery & Visualization
DATA
ANALYSTS
DATA
SCIENTISTS
Drivers & APIs
APPLICATIONS
AI
openCypher
& ISO GQL
Cloud
Use Case
CyGraph is used by multiple
government agencies and use cases
include detecting malicious network
activity, modeling and simulation of
cyberattacks, tracking Bitcoin
transactions and navigating through
CAPEC, a taxonomy for common attack
pattern enumeration and classification
that is laborious to traverse.
Solution
“CyGraph”- Based on the property
graph model implemented in Neo4j –
brings together isolated data and
events into an ongoing big picture for
decision support and situational
awareness.
Goal
Create a cyber warfare tool that
consolidates data into a
comprehensive picture
Challenge
Mitre Researchers had data, but lacked
relationships, making it difficult to
analyze the security environment
Neo4j - Enterprise Spotlight
Our Customers Are Solving
Complex And Valuable Problems
With Neo4j and Graphs
Come and Build with Us!
Thank
You
@jimwebber

More Related Content

What's hot

What's hot (20)

3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
 
Naxolink AI Concepts
Naxolink AI ConceptsNaxolink AI Concepts
Naxolink AI Concepts
 
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceBig Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
 
InTTrust_intro_ai_2019
InTTrust_intro_ai_2019InTTrust_intro_ai_2019
InTTrust_intro_ai_2019
 
Big Data LDN 2017: Building a Data-Driven Culture
Big Data LDN 2017: Building a Data-Driven CultureBig Data LDN 2017: Building a Data-Driven Culture
Big Data LDN 2017: Building a Data-Driven Culture
 
Top 6 Upcoming Big Data Trends of 2018!
Top 6 Upcoming Big Data Trends of 2018!Top 6 Upcoming Big Data Trends of 2018!
Top 6 Upcoming Big Data Trends of 2018!
 
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)
 
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictionsBig Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
 
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
 
Produktdatenmanagement mit Neo4j
Produktdatenmanagement mit Neo4jProduktdatenmanagement mit Neo4j
Produktdatenmanagement mit Neo4j
 
Big Data LDN 2017: Big Impact with Big Data
Big Data LDN 2017: Big Impact with Big DataBig Data LDN 2017: Big Impact with Big Data
Big Data LDN 2017: Big Impact with Big Data
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Neo4j im Fianzsektor: DIVIZEND
Neo4j im Fianzsektor: DIVIZENDNeo4j im Fianzsektor: DIVIZEND
Neo4j im Fianzsektor: DIVIZEND
 
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
 
5 Authentication Trends For 2018
5 Authentication Trends For 20185 Authentication Trends For 2018
5 Authentication Trends For 2018
 
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...
 
Innovation Leadership in the Digital Age by K. Ananth Krishnan, VP and CTO, TCS
Innovation Leadership in the Digital Age by K. Ananth Krishnan, VP and CTO, TCSInnovation Leadership in the Digital Age by K. Ananth Krishnan, VP and CTO, TCS
Innovation Leadership in the Digital Age by K. Ananth Krishnan, VP and CTO, TCS
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 

Similar to Hacked: Threats, Trends and the Power of Connected Data

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 

Similar to Hacked: Threats, Trends and the Power of Connected Data (20)

Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
AI and Big Data Analytics
AI and Big Data AnalyticsAI and Big Data Analytics
AI and Big Data Analytics
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Untitled presentation (1).pptx
Untitled presentation (1).pptxUntitled presentation (1).pptx
Untitled presentation (1).pptx
 
Big Data PPT
Big Data PPTBig Data PPT
Big Data PPT
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial Market
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 

More from Neo4j

More from Neo4j (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansQIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
 
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosBBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
 
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)
 
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge Graphs
 
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdfNeo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
 
Neo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with GraphNeo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with Graph
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Hacked: Threats, Trends and the Power of Connected Data

  • 2. ‘HACKED’ Threats and Trends Power of Connected Data Dr. Jim Webber, Chief Scientist
  • 3. 300% Increase In Cybercrime reported by FBI since the pandemic began- “IMC Group” 630% Rise In cloud-based cyber attacks between Jan-Apr, 2020- “Fintech News” 420% Rise Is the %age of supply chain attacks grew in last 12 months - “Sonatype” 238% Rise In crime on banks in 2020. 27% of COVID-19 cyberattacks targeted banks or healthcare organizations - “Fintech News” Cybersecurity in the Time of Pandemic
  • 4. 95% 88% 68% 86% Organizations Worldwide experienced Spear Phishing Attempts in 2019 -”Proofpoint” Breaches were Financially Motivated and 10% motivated by espionage -”Verizon” Cybersecurity Breaches are Caused by Human Error “Cybint” Business Leaders Feel their Cybersecurity Risks are Increasing - “Accenture” State of Cybersecurity Readiness
  • 5. The Economics of Cybersecurity $10.5 Trillion $170.4 Billion $3.86 Million $403 Billion The worldwide information security market is forecast to reach by 2022- “Gartner” Cybersecurity market forecasted to be worth by 2027- “CE Pro” Cybercrime will cost the world annually by 2025- “Cybersecurityventures” Average cost of a data breach as of 2020- “IBM”
  • 6. HACKING STATS The average time to identify a breach in 2020 - “IBM” 207 Days US nationals don’t know what steps to take; in the event of a data breach - “Varonis” 56% Breaches in 2020 involved personal data - “Verizon” 58% US nationals have never checked if they were affected by a data breach - “Varonis” 64%
  • 7. THREATS & TRENDS Malwares increased in 2020 - “Help Net Security” 358% The total number of DDoS attacks worldwide by 2023 - “Cisco” 15.4 Million The average Ransomware payment rose in 2020 - “Fintech News” 33% Reported security attacks are related to Phishing - “CSO Online” 80%
  • 8. Top 10 Trends in Data and Analytics, 11 May 2020, Rita Sallam et al. “Defenders think in lists, Attackers think in graphs, as long as this is true attackers win” - John Lambert, Distinguished Engineer, Vice President, Microsoft Threat Intelligence Center
  • 9. Protect Systems, services, and crown jewels Detect Anomalies in real-time Recover Quickly in the event of incidents Respond Rapidly with confidence to minimize impact So, Why Do We Need Graphs to Solve Cybersecurity Problem? A Holistic view 🡪 Connected Data
  • 10. Connections in Data are as Valuable as the Data Itself Networks of People Transaction Networks Bought B o u g h t V i e w e d R e t u r n e d Bought Knowledge Networks P l a y s Lives_in In_sport Likes F a n _ o f Plays_for E.g., Risk management, Supply chain, Payments E.g., Employees, Customers, Suppliers, Partners, Influencers E.g., Enterprise content, Domain specific content, eCommerce content K n o w s Knows Knows K n o w s
  • 11. 11 Connections are Core to Modern, Intelligent Applications Personalization Product Recommendations Personalized Health Media and Advertising Decision Analysis Fraud Prevention Network Analysis Forecasting Massive Data Integration Customers/Data 360 Compliance Optimize Operations Data Science AI & ML Behavior Prediction Patient/Customer Journey Disambiguation Data Driven Discovery & Innovation Drug Discovery Intelligence & Security Product & Process Innovation
  • 12. Data Analysis 7/10 20/25 7/10 Top Retail Firms Top Financial Firms Top Software Vendors Anyway You Like It Neo4j - The Graph Company The Industry’s Largest Dedicated Investment in Graphs 12 Creator of the Property Graph Thousands of Customers World-Wide HQ in Silicon Valley, offices include London, Munich, Paris & Malmo Industry Leaders use Neo4j On-Prem DB-as-a-Service In the Cloud
  • 13. 1 3 Graphs Lightspeed Adoption: Neo4j ~800 Enterprise Customers Customer Obsession 80 New Enterprise Customers added in 2020 Recognized as a Leader in The Forrester Wave™ for Graph Data Platforms First Graph ML for Enterprise ~2000 Startups
  • 14. 1 4 Graphs Lightspeed Adoption: Neo4j Graph database is the fastest growing DBMS category, and Neo4j is the Leader Developers 200k+ Meetups 72k+ Graph Database (DB-Engines) #1 Database (DB-Engines) Top 20 Neo4j Downloads 2.0 Mil Docker Pulls 144 Mil Deployment in the Cloud 90%+
  • 15. The Neo4j Graph Platform 15 Development & Administration Analytics Tooling BUSINESS USERS DEVELOPERS ADMINS Graph Analytics Graph Transactions Data Integration Discovery & Visualization DATA ANALYSTS DATA SCIENTISTS Drivers & APIs APPLICATIONS AI openCypher & ISO GQL Cloud
  • 16. Use Case CyGraph is used by multiple government agencies and use cases include detecting malicious network activity, modeling and simulation of cyberattacks, tracking Bitcoin transactions and navigating through CAPEC, a taxonomy for common attack pattern enumeration and classification that is laborious to traverse. Solution “CyGraph”- Based on the property graph model implemented in Neo4j – brings together isolated data and events into an ongoing big picture for decision support and situational awareness. Goal Create a cyber warfare tool that consolidates data into a comprehensive picture Challenge Mitre Researchers had data, but lacked relationships, making it difficult to analyze the security environment Neo4j - Enterprise Spotlight
  • 17.
  • 18. Our Customers Are Solving Complex And Valuable Problems With Neo4j and Graphs Come and Build with Us!