SlideShare a Scribd company logo
Big Iron to Big Data Analytics for Security,
Compliance, and the Mainframe
Ed Hallock
Director of Product Marketing and
Management
Today’s Presenter
Syncsort Confidential and Proprietary - do not copy or distribute
Ed Hallock is a highly experienced Information Technology Professional
with a broad experience base in software product development, support,
product management, marketing, and business development. In his
diverse career Ed has benefited from working for some of the largest
independent software vendors, in a variety of roles, providing enterprise
solutions to Global 1000 corporations. Ed has extensive experience in
performance and availability management for systems and applications.
He holds a bachelor’s degree in Computer Science from Montclair State
University in Upper Montclair, New Jersey and has presented at numerous
industry events as well as corporate related conferences and seminars.
Agenda
Security Landscape
IBM z/OS Mainframe and Security
SIEM and Big Data Analytics
z/OS Security, Big Data Analytics, and SIEM
Wrap-up/Q&A
Syncsort Confidential and Proprietary - do not copy or distribute
Security Landscape
The Reality of Security
The number of detected security incidents in 2015 soared by 107% over the year before.
Financial losses from security breaches rose 33% from 2014 to 2015.
68% of organizations worldwide purchased cybersecurity insurance in 2015, an increase of
15% over the year before.
Average information security spending per organization jumped 51% in 2015.
Information provided by PricewaterhouseCoopers (PwC) Global State of Information Security®
Survey
5
Syncsort Confidential and Proprietary - do not copy or distribute
Equifax Raided!
Impact is wide-spread and significant
Millions of people effected – SSN’s, credit card info, drivers license numbers
Effects could be felt for years
CIO and CSO forced to resign
6
Syncsort Confidential and Proprietary - do not copy or distribute
What is a Breach?
In 2015, there were 781 breaches in the U.S., which exposed more than 169
million records.
– Leading sector for number of records exposed was in healthcare-
medical services
Of all classes of data breach, it’s widely believed that less than half are ever
publicly disclosed.
Among mainframe security experts, the consensus seems to be that the
number of mainframe breaches is substantially higher than the number of
mainframe breaches disclosed.
7
Syncsort Confidential and Proprietary - do not copy or distribute
Identity Theft Resource Center (ITRC) defines a data
breach as an incident in which an individual name –
together with a Social Security number or driver’s
license number or medical record or financial record --
is potentially put at risk because of exposure.
Insiders: The Weakest Link
1/3 of all data breaches have been attributed to
insiders
– Employees, contractors, vendors, business
partners, or others who have been granted
privileged access to systems within the
organization
Employees come in many forms:
– employee who has privileged access but
neglects basic precautions
– disgruntled or misguided
– ex-employee that still has credentials
– employee who is duped by an outsider
8
Syncsort Confidential and Proprietary - do not copy or distribute
Breach Detection
In 2015, Mandiant, a division of FireEye, in its annual trends report found the average number
of days between a breach and discovery of the breach was 204 days.
– Only 31% of breached enterprises discovered the breach themselves. The rest were all
discovered by outside third parties when it was noticed that the breached data was being
used outside the enterprise.
9
Syncsort Confidential and Proprietary - do not copy or distribute
Breach Detection
In 2015, Mandiant, a division of FireEye, in its annual trends report found the average number
of days between a breach and discovery of the breach was 204 days.
– Only 31% of breached enterprises discovered the breach themselves. The rest were all
discovered by outside third parties when it was noticed that the breached data was being
used outside the enterprise.
10
Syncsort Confidential and Proprietary - do not copy or distribute
C-Suite Has Taken Notice
Risk of non-compliance with the growing mass of
governmental regulations and industry standards is
causing loss of sleep
C-suite face more rigorous levels of responsibility for
the integrity of enterprise data than did their
predecessors
Potential penalties for failure of oversight are greater
– fines and potentially jail sentences
Not to mention the damage to the corporate brand
when a breach becomes public
11
Syncsort Confidential and Proprietary - do not copy or distribute
Organizations Are Investing
J.P. Morgan Chase reported that it was planning to spend half a billion dollars on cybersecurity
in 2016 and 2017
» “The Firm and several other U.S. financial institutions have experienced significant distributed
denial-of-service attacks from technically sophisticated and well-resourced unauthorized parties
which are intended to disrupt online banking services. The Firm and its clients are also regularly
targeted by unauthorized parties using malicious code and viruses.”
Source: J.P. Morgan Chase & Co. 10-Q Quarterly Report
U.S. financial services -- cybersecurity market reached $9.5 billion in 2015, making it the
largest non-governmental cybersecurity market
Source: Homeland Security Research Corp. Banking & Financial Services Cybersecurity: U.S. Market
2015-2020 Report
12
Syncsort Confidential and Proprietary - do not copy or distribute
Organizations Are Investing
IDG Security Priorities for 2017
– 46% of organizations will invest in new security needs related to
evolving business models over the next 12 months
– Organizations say that SIEM technology is critical/very important (76%)
when facing threats and attacks, with enterprise organizations
reporting a greater degree of importance (84%)
13
Syncsort Confidential and Proprietary - do not copy or distribute
IBM z/OS Mainframe and Security
14
Syncsort Confidential and Proprietary - do not copy or distribute
The IBM z/OS Mainframe
For high-volume transactional processing, the mainframe
is the platform favored by large enterprises
Up to 80% of the world’s enterprise data and transactions
reside on or pass through IBM z Systems
MIPS has been on a sharply upward trajectory while the
processing capacity of each individual mainframe keeps
growing…
But the number of actual mainframes within the IT
infrastructure is declining and with it so are the SMEs
Z/OS security has been taken for granted in a lot of cases
15
Syncsort Confidential and Proprietary - do not copy or distribute
Is the z/OS Mainframe Secure?
For a long time the platform was viewed as “inherently”
secure
Implied the platform is secure by virtue of its
foundational design
Led organizations to believe that hardly anything needs to
be done to augment it
The assumption that the mainframe is “bullet proof”
tends to make some compliance audits relatively lax
Slow but steady decline in mainframe-specific security
expertise
16
Syncsort Confidential and Proprietary - do not copy or distribute
Is the z/OS Mainframe Secure?
RSA Security Conference in 2016: 30,000 security specialists at RSA versus
80 at SHARE in San Antonio in 2016
500 vendors at RSA offering security and compliance solutions for the
networked and distributed systems versus fewer than 10 vendors at SHARE
Striking differences given the criticality of protecting mainframe systems
17
Syncsort Confidential and Proprietary - do not copy or distribute
Is the z/OS Mainframe Secure?
Most enterprise security monitoring tools do not natively
read mainframe log records.
Blind to security events that occur on the mainframe.
Compliance status of the mainframe at the enterprise
level is “unknown”.
“Security by obscurity” -- breaches of the mainframe
simply are not published very often.
Mainframe breaches are often attributed to a “network
security” failure.
18
Syncsort Confidential and Proprietary - do not copy or distribute
Is the z/OS Mainframe Secure?
The mainframe is not “inherently” secure!
The mainframe is the most “securable” commercially
available computing platform!
Requires sufficiently skilled personnel to implement
effective security controls.
Need efficient monitoring software that enables the
enterprise to receive real-time or near-real-time alerts on
the security and compliance posture of the mainframe.
19
Syncsort Confidential and Proprietary - do not copy or distribute
SIEM & Big Data Analytics
20
Syncsort Confidential and Proprietary - do not copy or distribute
What is SIEM?
21
Syncsort Confidential and Proprietary - do not copy or distribute
What is SIEM?
Security Information and Event Management (SIEM) technology aggregates and provides real-
time analysis of security alerts.
– Event data is produced by security devices, network infrastructures, systems and
applications. The primary source is log data (i.e., SMF RACF records).
Analyze security event data in real time for internal and external threat detection and
management.
– Every organization fears potential hacks and data loss.
Collect, store, analyze and report on log data for incident response, forensics and regulatory
compliance.
– Meeting audit requirements is a key initiative in many vertical industries
SIEM products are gaining additional analytics capabilities around user behavior analytics (UBA)
– understanding user behavior and how it might impact security
22
Syncsort Confidential and Proprietary - do not copy or distribute
Big Iron Trends: Increased interest for real-time access to mainframe
machine data (SMF, RMF, log data, etc.) for business analytics
23
Syncsort Confidential and Proprietary - do not copy or distribute
Big Iron to Big Data Analytics Challenge
So many data sources
– SMF, Syslog, Log4j web and application logs, RMF,
RACF, USS files and standard datasets
Volume of data
– Millions of SMF records generated daily
Format of data
– Complex data structures (SMF) with headers, product
sections, data sections, variable length and self-
describing
– EBCDIC not recognized outside of the mainframe world
– Binary flags and fields
Difficult to get the information in a timely manner
– Not real-time, typically have to wait overnight for an
offload
Syncsort Confidential and Proprietary - do not copy or distribute
z/OS Security, Big Data Analytics, and SIEM
25
Syncsort Confidential and Proprietary - do not copy or distribute
Examples of SIEM Use Cases on z/OS
Detect Data Movements
– Inbound/Outbound FTP
Dataset access operations
– Determine potential security threats based on
unauthorized access attempts
– Ensure only authorized users are accessing critical
datasets
Privileged/non-privileged User Activity Monitoring
– Unusual behavior pattern – off hours connections
– High number of invalid logon attempts
Attack Detection
– Intrusion, Scans, Floods
Authentication Anomalies
– Entered the building at 08:30 but logged on from
another country at 09:00
Network Traffic Analysis
– High data volumes from a device/server
26
Syncsort Confidential and Proprietary - do not copy or distribute
SIEM: TSO Account & FTP Activity
Syncsort Confidential and Proprietary - do not copy or distribute
27
Job Initiations
TSO Account Activity
TSO Lockouts
FTP Session Activity
FTP Transfer Activity
SIEM: Intrusion Detection & TCP/IP Traffic
28
Syncsort Confidential and Proprietary - do not copy or distribute
Intrusion Detection showing Port Scans and
Denial of Service Attacks
TCP/IP Network Traffic
SIEM: Dataset Access Analysis
29
Syncsort Confidential and Proprietary - do not copy or distribute
Access by type for critical datasets by
user name
SIEM: RACF Violations and Message Trends
Syncsort Confidential and Proprietary - do not copy or distribute
30
RACF Violations by type RACF Violations by user
Trend message volumes today vs. same time last week and 2 weeks ago
Integration of z/OS Security with an Enterprise SIEM
Map z/OS security data sources to a common data model within
the SIEM
z/OS security information correlated with security information
from other platforms
Provides an enterprise-wide, integrated view of security across
all platforms
31
Syncsort Confidential and Proprietary - do not copy or distribute
Sample Intrusion Center Dashboard With Splunk Enterprise Security™
32
Syncsort Confidential and Proprietary - do not copy or distribute
Now shows z/OS® intrusions
and anomalies along with
events from other platforms
Sample Security Posture Dashboard With Splunk Enterprise Security™
33
Syncsort Confidential and Proprietary - do not copy or distribute
Now shows z/OS® intrusions
and anomalies along with
events from other platforms
Critical Mainframe Data 
Normalized and Streamed to Splunk with Ironstream®
Log4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
50+
types
RMF
Up to
50,000
values
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Get Ironstream® for SYSLOG for free
35
Syncsort Confidential and Proprietary - do not copy or distribute
http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
Industry Leader in Mainframe
Software Products
Thank You.
Questions?

More Related Content

What's hot

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Cyber security
Cyber securityCyber security
Cyber security
Vaibhav Jain
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
Arrow ECS UK
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015Paul Ferrillo
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
- Mark - Fullbright
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
Colleen Beck-Domanico
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
NIIT Technologies
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
The Economist Media Businesses
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
IBM Security
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
ImekDesign
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
Temok IT Services
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
Tripwire
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentConSanFrancisco123
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
 

What's hot (20)

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
 

Similar to Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe

Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
Santiago Cavanna
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
CSNP
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesJerry Harding
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report
Graeme Cross
 
NIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptxNIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptx
KellyMcBrair
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
Joseph DeFever
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
Cognizant
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
BrianHuntMSFCPACRISC
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
harman041
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 

Similar to Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe (20)

Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security Practices
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report Ponemon 2015 EMEA Cyber Impact Report
Ponemon 2015 EMEA Cyber Impact Report
 
NIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptxNIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptx
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 

More from Precisely

AI-Ready Data - The Key to Transforming Projects into Production.pptx
AI-Ready Data - The Key to Transforming Projects into Production.pptxAI-Ready Data - The Key to Transforming Projects into Production.pptx
AI-Ready Data - The Key to Transforming Projects into Production.pptx
Precisely
 
Building a Multi-Layered Defense for Your IBM i Security
Building a Multi-Layered Defense for Your IBM i SecurityBuilding a Multi-Layered Defense for Your IBM i Security
Building a Multi-Layered Defense for Your IBM i Security
Precisely
 
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdfOptimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Precisely
 
Chaining, Looping, and Long Text for Script Development and Automation.pdf
Chaining, Looping, and Long Text for Script Development and Automation.pdfChaining, Looping, and Long Text for Script Development and Automation.pdf
Chaining, Looping, and Long Text for Script Development and Automation.pdf
Precisely
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Navigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful MigrationNavigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful Migration
Precisely
 
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Unlocking the Power of Your IBM i and Z Security Data with Google ChronicleUnlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Precisely
 
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
Precisely
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Precisely
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Precisely
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
Precisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Precisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
Precisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
Precisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
Precisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
Precisely
 

More from Precisely (20)

AI-Ready Data - The Key to Transforming Projects into Production.pptx
AI-Ready Data - The Key to Transforming Projects into Production.pptxAI-Ready Data - The Key to Transforming Projects into Production.pptx
AI-Ready Data - The Key to Transforming Projects into Production.pptx
 
Building a Multi-Layered Defense for Your IBM i Security
Building a Multi-Layered Defense for Your IBM i SecurityBuilding a Multi-Layered Defense for Your IBM i Security
Building a Multi-Layered Defense for Your IBM i Security
 
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdfOptimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
 
Chaining, Looping, and Long Text for Script Development and Automation.pdf
Chaining, Looping, and Long Text for Script Development and Automation.pdfChaining, Looping, and Long Text for Script Development and Automation.pdf
Chaining, Looping, and Long Text for Script Development and Automation.pdf
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Navigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful MigrationNavigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful Migration
 
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Unlocking the Power of Your IBM i and Z Security Data with Google ChronicleUnlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
 
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe

  • 1. Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe Ed Hallock Director of Product Marketing and Management
  • 2. Today’s Presenter Syncsort Confidential and Proprietary - do not copy or distribute Ed Hallock is a highly experienced Information Technology Professional with a broad experience base in software product development, support, product management, marketing, and business development. In his diverse career Ed has benefited from working for some of the largest independent software vendors, in a variety of roles, providing enterprise solutions to Global 1000 corporations. Ed has extensive experience in performance and availability management for systems and applications. He holds a bachelor’s degree in Computer Science from Montclair State University in Upper Montclair, New Jersey and has presented at numerous industry events as well as corporate related conferences and seminars.
  • 3. Agenda Security Landscape IBM z/OS Mainframe and Security SIEM and Big Data Analytics z/OS Security, Big Data Analytics, and SIEM Wrap-up/Q&A Syncsort Confidential and Proprietary - do not copy or distribute
  • 5. The Reality of Security The number of detected security incidents in 2015 soared by 107% over the year before. Financial losses from security breaches rose 33% from 2014 to 2015. 68% of organizations worldwide purchased cybersecurity insurance in 2015, an increase of 15% over the year before. Average information security spending per organization jumped 51% in 2015. Information provided by PricewaterhouseCoopers (PwC) Global State of Information Security® Survey 5 Syncsort Confidential and Proprietary - do not copy or distribute
  • 6. Equifax Raided! Impact is wide-spread and significant Millions of people effected – SSN’s, credit card info, drivers license numbers Effects could be felt for years CIO and CSO forced to resign 6 Syncsort Confidential and Proprietary - do not copy or distribute
  • 7. What is a Breach? In 2015, there were 781 breaches in the U.S., which exposed more than 169 million records. – Leading sector for number of records exposed was in healthcare- medical services Of all classes of data breach, it’s widely believed that less than half are ever publicly disclosed. Among mainframe security experts, the consensus seems to be that the number of mainframe breaches is substantially higher than the number of mainframe breaches disclosed. 7 Syncsort Confidential and Proprietary - do not copy or distribute Identity Theft Resource Center (ITRC) defines a data breach as an incident in which an individual name – together with a Social Security number or driver’s license number or medical record or financial record -- is potentially put at risk because of exposure.
  • 8. Insiders: The Weakest Link 1/3 of all data breaches have been attributed to insiders – Employees, contractors, vendors, business partners, or others who have been granted privileged access to systems within the organization Employees come in many forms: – employee who has privileged access but neglects basic precautions – disgruntled or misguided – ex-employee that still has credentials – employee who is duped by an outsider 8 Syncsort Confidential and Proprietary - do not copy or distribute
  • 9. Breach Detection In 2015, Mandiant, a division of FireEye, in its annual trends report found the average number of days between a breach and discovery of the breach was 204 days. – Only 31% of breached enterprises discovered the breach themselves. The rest were all discovered by outside third parties when it was noticed that the breached data was being used outside the enterprise. 9 Syncsort Confidential and Proprietary - do not copy or distribute
  • 10. Breach Detection In 2015, Mandiant, a division of FireEye, in its annual trends report found the average number of days between a breach and discovery of the breach was 204 days. – Only 31% of breached enterprises discovered the breach themselves. The rest were all discovered by outside third parties when it was noticed that the breached data was being used outside the enterprise. 10 Syncsort Confidential and Proprietary - do not copy or distribute
  • 11. C-Suite Has Taken Notice Risk of non-compliance with the growing mass of governmental regulations and industry standards is causing loss of sleep C-suite face more rigorous levels of responsibility for the integrity of enterprise data than did their predecessors Potential penalties for failure of oversight are greater – fines and potentially jail sentences Not to mention the damage to the corporate brand when a breach becomes public 11 Syncsort Confidential and Proprietary - do not copy or distribute
  • 12. Organizations Are Investing J.P. Morgan Chase reported that it was planning to spend half a billion dollars on cybersecurity in 2016 and 2017 » “The Firm and several other U.S. financial institutions have experienced significant distributed denial-of-service attacks from technically sophisticated and well-resourced unauthorized parties which are intended to disrupt online banking services. The Firm and its clients are also regularly targeted by unauthorized parties using malicious code and viruses.” Source: J.P. Morgan Chase & Co. 10-Q Quarterly Report U.S. financial services -- cybersecurity market reached $9.5 billion in 2015, making it the largest non-governmental cybersecurity market Source: Homeland Security Research Corp. Banking & Financial Services Cybersecurity: U.S. Market 2015-2020 Report 12 Syncsort Confidential and Proprietary - do not copy or distribute
  • 13. Organizations Are Investing IDG Security Priorities for 2017 – 46% of organizations will invest in new security needs related to evolving business models over the next 12 months – Organizations say that SIEM technology is critical/very important (76%) when facing threats and attacks, with enterprise organizations reporting a greater degree of importance (84%) 13 Syncsort Confidential and Proprietary - do not copy or distribute
  • 14. IBM z/OS Mainframe and Security 14 Syncsort Confidential and Proprietary - do not copy or distribute
  • 15. The IBM z/OS Mainframe For high-volume transactional processing, the mainframe is the platform favored by large enterprises Up to 80% of the world’s enterprise data and transactions reside on or pass through IBM z Systems MIPS has been on a sharply upward trajectory while the processing capacity of each individual mainframe keeps growing… But the number of actual mainframes within the IT infrastructure is declining and with it so are the SMEs Z/OS security has been taken for granted in a lot of cases 15 Syncsort Confidential and Proprietary - do not copy or distribute
  • 16. Is the z/OS Mainframe Secure? For a long time the platform was viewed as “inherently” secure Implied the platform is secure by virtue of its foundational design Led organizations to believe that hardly anything needs to be done to augment it The assumption that the mainframe is “bullet proof” tends to make some compliance audits relatively lax Slow but steady decline in mainframe-specific security expertise 16 Syncsort Confidential and Proprietary - do not copy or distribute
  • 17. Is the z/OS Mainframe Secure? RSA Security Conference in 2016: 30,000 security specialists at RSA versus 80 at SHARE in San Antonio in 2016 500 vendors at RSA offering security and compliance solutions for the networked and distributed systems versus fewer than 10 vendors at SHARE Striking differences given the criticality of protecting mainframe systems 17 Syncsort Confidential and Proprietary - do not copy or distribute
  • 18. Is the z/OS Mainframe Secure? Most enterprise security monitoring tools do not natively read mainframe log records. Blind to security events that occur on the mainframe. Compliance status of the mainframe at the enterprise level is “unknown”. “Security by obscurity” -- breaches of the mainframe simply are not published very often. Mainframe breaches are often attributed to a “network security” failure. 18 Syncsort Confidential and Proprietary - do not copy or distribute
  • 19. Is the z/OS Mainframe Secure? The mainframe is not “inherently” secure! The mainframe is the most “securable” commercially available computing platform! Requires sufficiently skilled personnel to implement effective security controls. Need efficient monitoring software that enables the enterprise to receive real-time or near-real-time alerts on the security and compliance posture of the mainframe. 19 Syncsort Confidential and Proprietary - do not copy or distribute
  • 20. SIEM & Big Data Analytics 20 Syncsort Confidential and Proprietary - do not copy or distribute
  • 21. What is SIEM? 21 Syncsort Confidential and Proprietary - do not copy or distribute
  • 22. What is SIEM? Security Information and Event Management (SIEM) technology aggregates and provides real- time analysis of security alerts. – Event data is produced by security devices, network infrastructures, systems and applications. The primary source is log data (i.e., SMF RACF records). Analyze security event data in real time for internal and external threat detection and management. – Every organization fears potential hacks and data loss. Collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. – Meeting audit requirements is a key initiative in many vertical industries SIEM products are gaining additional analytics capabilities around user behavior analytics (UBA) – understanding user behavior and how it might impact security 22 Syncsort Confidential and Proprietary - do not copy or distribute
  • 23. Big Iron Trends: Increased interest for real-time access to mainframe machine data (SMF, RMF, log data, etc.) for business analytics 23 Syncsort Confidential and Proprietary - do not copy or distribute
  • 24. Big Iron to Big Data Analytics Challenge So many data sources – SMF, Syslog, Log4j web and application logs, RMF, RACF, USS files and standard datasets Volume of data – Millions of SMF records generated daily Format of data – Complex data structures (SMF) with headers, product sections, data sections, variable length and self- describing – EBCDIC not recognized outside of the mainframe world – Binary flags and fields Difficult to get the information in a timely manner – Not real-time, typically have to wait overnight for an offload Syncsort Confidential and Proprietary - do not copy or distribute
  • 25. z/OS Security, Big Data Analytics, and SIEM 25 Syncsort Confidential and Proprietary - do not copy or distribute
  • 26. Examples of SIEM Use Cases on z/OS Detect Data Movements – Inbound/Outbound FTP Dataset access operations – Determine potential security threats based on unauthorized access attempts – Ensure only authorized users are accessing critical datasets Privileged/non-privileged User Activity Monitoring – Unusual behavior pattern – off hours connections – High number of invalid logon attempts Attack Detection – Intrusion, Scans, Floods Authentication Anomalies – Entered the building at 08:30 but logged on from another country at 09:00 Network Traffic Analysis – High data volumes from a device/server 26 Syncsort Confidential and Proprietary - do not copy or distribute
  • 27. SIEM: TSO Account & FTP Activity Syncsort Confidential and Proprietary - do not copy or distribute 27 Job Initiations TSO Account Activity TSO Lockouts FTP Session Activity FTP Transfer Activity
  • 28. SIEM: Intrusion Detection & TCP/IP Traffic 28 Syncsort Confidential and Proprietary - do not copy or distribute Intrusion Detection showing Port Scans and Denial of Service Attacks TCP/IP Network Traffic
  • 29. SIEM: Dataset Access Analysis 29 Syncsort Confidential and Proprietary - do not copy or distribute Access by type for critical datasets by user name
  • 30. SIEM: RACF Violations and Message Trends Syncsort Confidential and Proprietary - do not copy or distribute 30 RACF Violations by type RACF Violations by user Trend message volumes today vs. same time last week and 2 weeks ago
  • 31. Integration of z/OS Security with an Enterprise SIEM Map z/OS security data sources to a common data model within the SIEM z/OS security information correlated with security information from other platforms Provides an enterprise-wide, integrated view of security across all platforms 31 Syncsort Confidential and Proprietary - do not copy or distribute
  • 32. Sample Intrusion Center Dashboard With Splunk Enterprise Security™ 32 Syncsort Confidential and Proprietary - do not copy or distribute Now shows z/OS® intrusions and anomalies along with events from other platforms
  • 33. Sample Security Posture Dashboard With Splunk Enterprise Security™ 33 Syncsort Confidential and Proprietary - do not copy or distribute Now shows z/OS® intrusions and anomalies along with events from other platforms
  • 34. Critical Mainframe Data  Normalized and Streamed to Splunk with Ironstream® Log4jFile Load SYSLOG SYSLOGD logs security SMF 50+ types RMF Up to 50,000 values DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USS
  • 35. Get Ironstream® for SYSLOG for free 35 Syncsort Confidential and Proprietary - do not copy or distribute http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
  • 36. Industry Leader in Mainframe Software Products