SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Big Data for Cybersecurity
Mouaz Alnouri
25 March 2021
This Session will be recorded and posted on Skilledfield’s Youtube Channel
About me
I’m Mouaz Alnouri, the Managing Director of Skilledfield.
We help clients unleash the power of big data technology to detect cyber
security events and utilise automation to efficiently alert, escalate and
respond to security threats.
Technologist with years of experience in solving complex business
problems through creative client-centric strategies and value-driven
solutions. A change agent, capable of orchestrating a transformative
business strategy through data-driven decisions.
2
Mouaz leads the Skilledfield
team with an unrivalled passion
for data and a zest for problem
solving. With over a decade in
the IT services industry, he’s
provided intelligent solutions
for complex problems
throughout his career. He’s
worked with major technology
and telecommunications firms
including Telstra and NBN Co.
Limited, where he’s delivered
data focused solutions that
have significantly improved
operational efficiency. He’s a
customer-focused problem
solver that leads the Skilledfield
team towards their vision to
become Australia’s leading Big
Data solutions provider.
https://www.linkedin.com/in/malnouri/
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
What we are covering today
➔ One Slides about Skilledfield
➔ Why Cybersecurity is a Big Data use case
➔ How do we address Cybersecurity as Big Data Professionals
➔ How do we keep up with the emerging cyber threats
➔ Benefits of Big Data Technology for Cybersecurity
3
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
About Skilledfield: A Field of Skilled professionals!
4
Uplift Security Detection and
Response Capability
Uplift Observability Capability BI to AI Analytics Services
● Centralised Security Event
logging and auditing
● Endpoint Protection
● SOAR
● Advanced Security Analytics
● Managed Services
● Centralised Operational event
monitoring and alerting
● AIOps, (Artificial Intelligence for
IT operations)
● Managed Services
● Big Data Analytics using Elastic
● Big Data Analytics using
Databricks
● Big Data Analytics using
Microsoft Azure Services
Solving Complex Problems with Simplified Solutions
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Cybersecurity is Big Data Use Case
5
Volume
High amount of data
generated In terabytes
Velocity
Generated in real-time
in streams, batch or
bits
Variety
Structured,
Unstructured, Semi
structured
Big Data
Use Case
Protect
R
e
s
p
o
n
s
e
&
R
e
c
o
v
e
r
I
d
e
n
t
i
f
y
&
D
e
t
e
c
t
Assessment
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Detection Data Engineering Pipeline
6
Acquire Parse Enrich Analyse Alert
Sources
Tune
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Design Data Analytics Solution
● Comprehend business value chain
● Understand short-term and long-term goals and identify key
business questions
● Define analytics use cases
● Perform an initial assessment of data sources
● Design a solution
7
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Threat Modelling - PASTA (Risk Based)
8
Define
Objectives
Define
Technical
Scope
Application
Decomposition
Threat Analysis
Vulnerability &
Weakness
Analysis
Attack
Modelling
Risk & Impact
Analysis
The Process for Attack Simulation and Threat Analysis
https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf
Potential Threat: Identified, categorized, analysed, prioritise response
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Most Concerning Types of Cyber Threats
9
According to IT security decision makers worldwide as of November 2019. Source:
https://www.statista.com/statistics/500946/worldwide-leading-it-security-threats/
Malware is the most concerning cyberthreat
targeting organizations. Phishing and
ransomware were jointly ranked second.
Over the last two years, the number of insider
incidents has increased by 47%.
30 percent of malware attacks are zero day
exploits
Advanced attackers uniquely compile the
code they bring with them to specifically not
match anything they’ve used elsewhere or
ever will again
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Behavioural Analytics
10
Acquire Parse Enrich Analyse Alert
Sources
Tune
Learn Detect
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Same data. Different questions.
11
Ingest & prepare Alerting and Machine learning Detect, hunt, investigate
Ecosystem of network and host
data connectors used to
orchestrate your data feed from
edge devices.
Processing the data in real-time
and analysing it to identify
threats and detecting abnormal
behaviours.
Ad hoc queries at scale and
interactive threat hunting allows
a rapid event triage and
investigation.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
The DAMA Wheel
12
To use consistent words
and relations which
leads to more alignment
with current and future
requirements
Data lifecycle, data
integrity, data availability
and data usage
performance
Access control,
confidentiality and
regulatory compliance
Data Consolidation and
Data Movement
Endure effective and
efficient storage, retrieval
and use of data
Provide authoritative
source of reconciled and
quality-assessed data
Technical environment
and Technical and
Business Processes
Provide organisational
understanding of
business terms and
usages
Identify Data storage
and processing
requirements
Standards, requirements
and specifications for
data
Principles, policies,
procedures, metrics,
tools and responsibilities
for data management
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Skilledfield is Gold Sponsor for DAMA Australia
Our sponsorship in the Data Architecture and Data Security areas demonstrates our
commitment to the data community and our support for best practices. Our engineers
leverage the Data Management Body of Knowledge (DMBoK) to apply information and
data management best practices to enhance the business value of your Big Data.
13
The Data
Management
Association
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Unleash Big Data Technologies to Solve Complex CyberSecurity Problems
Uplift Security Detection and Response Capability
14
● Stop malware at the host, while enabling centralized visibility and advanced threat detection.
● Perform threat-modeling to understand the organization's defensive capabilities and develop customised detections
whilst tuning out false alerts to target genuine vulnerabilities.
● Collect, transform and store data from a broad set of systems including custom ones, build a strong track record of
transparency to inspect security measures and increase visibility.
● Implement fast, scalable, and relevant threat intelligence and data enrichment.
● Leverage machine learning to combat zero-day attacks.
● Organise SOC tasks and playbooks for automated analysis and response.
● Right size your solution including hosting, data throughput, licencing and operational resources.
Respond
Analyse
Detect
85% 30%
50%
of MSPs reported
attacks against SMBs
over the last two years.
of malware attacks
are zero-day exploits.
of security alerts are
false positives leading
to SOCs increasing
staff.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Protect your Organisation!
15
“It takes 20 years to build a reputation
and a few minutes of cyber-incident to
ruin it”
STEPHANE NAPPO
Global Head of Information Security for Société Générale International Banking & Financial Services
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
“A more secure
online world for
Australians, their
businesses and the
essential services
upon which we all
depend.”
Australia’s Cyber Security Strategy 2020
16
https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
● Invest $1.67 billion over 10 years
● New ways to investigate and shut
down cyber crime, including on the
dark web.
● Advice for small and medium
enterprises to increase their cyber
resilience.
● Clear guidance for businesses and
consumers about securing Internet of
Things devices.
● Improved community awareness of
cyber security threats.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Thank you!
info@skilledfield.com.au
17
https://skilledfield.com.au/
https://www.linkedin.com/company/skilled-field/
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel

Más contenido relacionado

La actualidad más candente

The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...Mark Underwood
 
Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)Anant Desai
 
The Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent OffersThe Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent OffersCloudera, Inc.
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
 
Digital alpha technologies inc
Digital alpha technologies incDigital alpha technologies inc
Digital alpha technologies incDigital Alpha
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overviewjayallen77
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1Carol Jackson
 
Solving Your Top IT Challenges
Solving Your Top IT Challenges Solving Your Top IT Challenges
Solving Your Top IT Challenges Insight
 
The Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise ITThe Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise ITInsight
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDClearedJobs.Net
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of ThingsTripwire
 
Virtual Reality in Financial Services (A Primer)
Virtual Reality in Financial Services (A Primer)Virtual Reality in Financial Services (A Primer)
Virtual Reality in Financial Services (A Primer)Sandhya Krishnamurthy
 
Meetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learningMeetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learningMegatris Comp
 

La actualidad más candente (20)

Cloud computing for banking
Cloud computing for bankingCloud computing for banking
Cloud computing for banking
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)Digital Transformation (Implications for the CXO)
Digital Transformation (Implications for the CXO)
 
Future of Big Data
Future of Big DataFuture of Big Data
Future of Big Data
 
Infrastructure Matters
Infrastructure MattersInfrastructure Matters
Infrastructure Matters
 
The Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent OffersThe Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent Offers
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Digital alpha technologies inc
Digital alpha technologies incDigital alpha technologies inc
Digital alpha technologies inc
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
 
Into the Big Data Future with Watson Analytics
Into the Big Data Future with Watson AnalyticsInto the Big Data Future with Watson Analytics
Into the Big Data Future with Watson Analytics
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1
 
Big Data & Analytics Day
Big Data & Analytics Day Big Data & Analytics Day
Big Data & Analytics Day
 
Solving Your Top IT Challenges
Solving Your Top IT Challenges Solving Your Top IT Challenges
Solving Your Top IT Challenges
 
The Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise ITThe Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise IT
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Machine learning in Banks
Machine learning in BanksMachine learning in Banks
Machine learning in Banks
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
 
Adapting for the Internet of Things
Adapting for the Internet of ThingsAdapting for the Internet of Things
Adapting for the Internet of Things
 
Virtual Reality in Financial Services (A Primer)
Virtual Reality in Financial Services (A Primer)Virtual Reality in Financial Services (A Primer)
Virtual Reality in Financial Services (A Primer)
 
Meetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learningMeetup7 integration microservices_machine_learning
Meetup7 integration microservices_machine_learning
 

Similar a Big data for cybersecurity - skilledfield slides - 25032021

Meetup introduction to elastic stack - search at scale - skilledfield slide...
Meetup   introduction to elastic stack - search at scale - skilledfield slide...Meetup   introduction to elastic stack - search at scale - skilledfield slide...
Meetup introduction to elastic stack - search at scale - skilledfield slide...Mouaz Alnouri
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Enterprise asset management industry whitepaper extract | "Asset intelligence...
Enterprise asset management industry whitepaper extract | "Asset intelligence...Enterprise asset management industry whitepaper extract | "Asset intelligence...
Enterprise asset management industry whitepaper extract | "Asset intelligence...Relegen Pty Ltd
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Precisely
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Net at Work
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Big Data Analytics_Unit1.pptx
Big Data Analytics_Unit1.pptxBig Data Analytics_Unit1.pptx
Big Data Analytics_Unit1.pptxPrabhaJoshi4
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalStakeout
 
How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)Denodo
 

Similar a Big data for cybersecurity - skilledfield slides - 25032021 (20)

Meetup introduction to elastic stack - search at scale - skilledfield slide...
Meetup   introduction to elastic stack - search at scale - skilledfield slide...Meetup   introduction to elastic stack - search at scale - skilledfield slide...
Meetup introduction to elastic stack - search at scale - skilledfield slide...
 
Learnmystuff - Training Catalog
Learnmystuff - Training CatalogLearnmystuff - Training Catalog
Learnmystuff - Training Catalog
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Enterprise asset management industry whitepaper extract | "Asset intelligence...
Enterprise asset management industry whitepaper extract | "Asset intelligence...Enterprise asset management industry whitepaper extract | "Asset intelligence...
Enterprise asset management industry whitepaper extract | "Asset intelligence...
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Big Data Analytics_Unit1.pptx
Big Data Analytics_Unit1.pptxBig Data Analytics_Unit1.pptx
Big Data Analytics_Unit1.pptx
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout Overview
 
How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)How Data Virtualization Puts Machine Learning into Production (APAC)
How Data Virtualization Puts Machine Learning into Production (APAC)
 

Último

In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样wsppdmt
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...Health
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...nirzagarg
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...nirzagarg
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...kumargunjan9515
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareGraham Ware
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteedamy56318795
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxronsairoathenadugay
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...HyderabadDolls
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...HyderabadDolls
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...HyderabadDolls
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...HyderabadDolls
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfSayantanBiswas37
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRajesh Mondal
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numberssuginr1
 

Último (20)

In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbers
 

Big data for cybersecurity - skilledfield slides - 25032021

  • 1. Big Data for Cybersecurity Mouaz Alnouri 25 March 2021 This Session will be recorded and posted on Skilledfield’s Youtube Channel
  • 2. About me I’m Mouaz Alnouri, the Managing Director of Skilledfield. We help clients unleash the power of big data technology to detect cyber security events and utilise automation to efficiently alert, escalate and respond to security threats. Technologist with years of experience in solving complex business problems through creative client-centric strategies and value-driven solutions. A change agent, capable of orchestrating a transformative business strategy through data-driven decisions. 2 Mouaz leads the Skilledfield team with an unrivalled passion for data and a zest for problem solving. With over a decade in the IT services industry, he’s provided intelligent solutions for complex problems throughout his career. He’s worked with major technology and telecommunications firms including Telstra and NBN Co. Limited, where he’s delivered data focused solutions that have significantly improved operational efficiency. He’s a customer-focused problem solver that leads the Skilledfield team towards their vision to become Australia’s leading Big Data solutions provider. https://www.linkedin.com/in/malnouri/ This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 3. What we are covering today ➔ One Slides about Skilledfield ➔ Why Cybersecurity is a Big Data use case ➔ How do we address Cybersecurity as Big Data Professionals ➔ How do we keep up with the emerging cyber threats ➔ Benefits of Big Data Technology for Cybersecurity 3 This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 4. About Skilledfield: A Field of Skilled professionals! 4 Uplift Security Detection and Response Capability Uplift Observability Capability BI to AI Analytics Services ● Centralised Security Event logging and auditing ● Endpoint Protection ● SOAR ● Advanced Security Analytics ● Managed Services ● Centralised Operational event monitoring and alerting ● AIOps, (Artificial Intelligence for IT operations) ● Managed Services ● Big Data Analytics using Elastic ● Big Data Analytics using Databricks ● Big Data Analytics using Microsoft Azure Services Solving Complex Problems with Simplified Solutions This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 5. Cybersecurity is Big Data Use Case 5 Volume High amount of data generated In terabytes Velocity Generated in real-time in streams, batch or bits Variety Structured, Unstructured, Semi structured Big Data Use Case Protect R e s p o n s e & R e c o v e r I d e n t i f y & D e t e c t Assessment This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 6. Detection Data Engineering Pipeline 6 Acquire Parse Enrich Analyse Alert Sources Tune This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 7. Design Data Analytics Solution ● Comprehend business value chain ● Understand short-term and long-term goals and identify key business questions ● Define analytics use cases ● Perform an initial assessment of data sources ● Design a solution 7 This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 8. Threat Modelling - PASTA (Risk Based) 8 Define Objectives Define Technical Scope Application Decomposition Threat Analysis Vulnerability & Weakness Analysis Attack Modelling Risk & Impact Analysis The Process for Attack Simulation and Threat Analysis https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf Potential Threat: Identified, categorized, analysed, prioritise response This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 9. Most Concerning Types of Cyber Threats 9 According to IT security decision makers worldwide as of November 2019. Source: https://www.statista.com/statistics/500946/worldwide-leading-it-security-threats/ Malware is the most concerning cyberthreat targeting organizations. Phishing and ransomware were jointly ranked second. Over the last two years, the number of insider incidents has increased by 47%. 30 percent of malware attacks are zero day exploits Advanced attackers uniquely compile the code they bring with them to specifically not match anything they’ve used elsewhere or ever will again This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 10. Behavioural Analytics 10 Acquire Parse Enrich Analyse Alert Sources Tune Learn Detect This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 11. Same data. Different questions. 11 Ingest & prepare Alerting and Machine learning Detect, hunt, investigate Ecosystem of network and host data connectors used to orchestrate your data feed from edge devices. Processing the data in real-time and analysing it to identify threats and detecting abnormal behaviours. Ad hoc queries at scale and interactive threat hunting allows a rapid event triage and investigation. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 12. The DAMA Wheel 12 To use consistent words and relations which leads to more alignment with current and future requirements Data lifecycle, data integrity, data availability and data usage performance Access control, confidentiality and regulatory compliance Data Consolidation and Data Movement Endure effective and efficient storage, retrieval and use of data Provide authoritative source of reconciled and quality-assessed data Technical environment and Technical and Business Processes Provide organisational understanding of business terms and usages Identify Data storage and processing requirements Standards, requirements and specifications for data Principles, policies, procedures, metrics, tools and responsibilities for data management This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 13. Skilledfield is Gold Sponsor for DAMA Australia Our sponsorship in the Data Architecture and Data Security areas demonstrates our commitment to the data community and our support for best practices. Our engineers leverage the Data Management Body of Knowledge (DMBoK) to apply information and data management best practices to enhance the business value of your Big Data. 13 The Data Management Association This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 14. Unleash Big Data Technologies to Solve Complex CyberSecurity Problems Uplift Security Detection and Response Capability 14 ● Stop malware at the host, while enabling centralized visibility and advanced threat detection. ● Perform threat-modeling to understand the organization's defensive capabilities and develop customised detections whilst tuning out false alerts to target genuine vulnerabilities. ● Collect, transform and store data from a broad set of systems including custom ones, build a strong track record of transparency to inspect security measures and increase visibility. ● Implement fast, scalable, and relevant threat intelligence and data enrichment. ● Leverage machine learning to combat zero-day attacks. ● Organise SOC tasks and playbooks for automated analysis and response. ● Right size your solution including hosting, data throughput, licencing and operational resources. Respond Analyse Detect 85% 30% 50% of MSPs reported attacks against SMBs over the last two years. of malware attacks are zero-day exploits. of security alerts are false positives leading to SOCs increasing staff. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 15. Protect your Organisation! 15 “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it” STEPHANE NAPPO Global Head of Information Security for Société Générale International Banking & Financial Services This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 16. “A more secure online world for Australians, their businesses and the essential services upon which we all depend.” Australia’s Cyber Security Strategy 2020 16 https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf ● Invest $1.67 billion over 10 years ● New ways to investigate and shut down cyber crime, including on the dark web. ● Advice for small and medium enterprises to increase their cyber resilience. ● Clear guidance for businesses and consumers about securing Internet of Things devices. ● Improved community awareness of cyber security threats. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel