INFA15

Big Data & Data Security
How to master data security, in order to put Big Data's potential to work
John Furrier
On average, it takes 156 days for a computer security breach to be detected. How can big data change this?
Ash Parikh
the real question to ask is - what is needed to handle these breaches? #INFA15 #bigdataready
Matt Healey
Big data has to be the foundation that analytics are built on to address the issues. Clearly better analytics are needed becayse 156 days is way too long
John Haddad
Ingesting real-time machine logs from systems across the enterprise simultaneously into a data lake and real-time event stream you can begin to uncover and act upon new security breach patterns much faster.
John Furrier
@JohnM_Haddad bringing data together is also something I'd add to your comment bc then the ability to see patterns across data sets becomes viable; oh yeah near real time is good
Tristan Bishop
A solid data management foundation can reduce the risk of any new Big Data project
John Haddad
Let’s face it, security breaches will happen, so what are you doing to protect sensitive data at the source? It is important to be able to know where sensitive data resides and then mask/obfuscate data to protect it in case of a breach
Amit Walia
Data Security Intelligence. Its all about understanding data before you enforce any controls #BigDataReady #secureatsource
Amit Walia
Learn more at secureatsource.me
Matt Healey
Being able to mask data is critical. You can not continue to allow people to get access to all of the data becuase they need some of it
Ash Parikh
@Amit_Walia per a report by #TDWI data security is a critical success factor to become #BigDataReady http://tdwi.org/rese...
Amit Walia
@MHealey_Neur Agree on the foundation. But need to understand sensitive data from the pool of data before you put any controls. #BigDataReady #secureatsource
Matt Healey
@Amit_Walia true. in my thought the foundation involves big data, and part of that is an understanding of the data
John Haddad
Automated data discovery can detect where sensitive data resides in a pool (or lake) of data. This is the first step of data governance (i.e. securing your data) #BigDataReady #secureatsource
Amit Walia
@MHealey_Neur Agree. That's where we need to discover, profile, and classify sensitive data from the vast pool of big data. This is Step 1
Amit Walia
Step 2 is to understand the proliferation of sensitive data. Each step increases risk exponentially #secureatsource #bigdataready
Amit Walia
Then layer on top user access patterns and behavior #bigdataready #secureatsource
John Haddad
Data security intelligence is key to answering critical questions like: where is my sensitive data, is it protected, where does it reside, who has access and who uses it, what happens if stolen, etc. #BigDataReady #secureatsource #INFA15
Amit Walia
Then use rules, machine learning and predictive modeling to apply relevant security controls #secureatsource #bigdataready
Philip Russom
I haven't seen #BigData expose breaches or fraud in real time. But close. A bank found insider trading by studying a Pb of email on #Hadoop. A large computer manufacturer found a thousand internal security breaches via server logs on #Hadoop.
TigerText
What about the idea of sharing the data analytics via #BYOD and mobile? How do you deal with the security issues of big data results sharing via mobile? #INFA15 #BigData
Matt Healey
That is an extension of the blind spot that I mentioend around big data security. How many people remeber the Prudential employee leaving the laptop in a cab with a ton of customer records?
Hyoun Park
Good point @tigertext. Mobile requires its own set of tools to support device and application management as well
John Furrier
there are solutions out there from USB secure devices to apps that minimize human error
Jeff Frick
> Living in an AG (After Google) World, Everyone wants / expects access to all their apps & data, from any device, all the time.
TigerText
What about using secure messaging for this application? @MHealey_Neur @tigertext #INFA15 #BigData #WorkSecurely
Amit Walia
@JeffFrick Totally. People want their data anytime, anywhere, and on any device. Hence you need intelligence around your data to ensure its safe and secure #secureatsource #datasecurityintelligence
TigerText
#TigerText also has secure and encrypted file attachments, which might make secure messaging a good mobile #BigData solaution. #INFA15 #BigData #WorkSecurely
John Furrier
@MHealey_Neur Matt that was a cube quote - one of my favs; I would also add after iphone too; since the iphone many cool things have happened
Matt Healey
@furrier I like "AG" better than post iphone. Maybe because it is a two letter acronym
John Furrier
How would you describe the #IW15 focus this year? What's the big action happening at the event?
Tristan Bishop
The overall event theme is “All Things Data” - There are five track themes
John Furrier
I see lots of opensource focus too. Anything in particular can we expect with opensource?
Tristan Bishop
For those with data stuck in silos, they can learn way to create a single source of truth (This is the Information Quality and Governance track.)
Matt Healey
@KnowledgeBishop MDM and a single view of the truth has been a massive problme for 15 years and is only getting worse.
Tristan Bishop
other options too
Tristan Bishop
Those immersed in complex analytics and application consolidation have a Data Integration track
Tristan Bishop
Those who want to avoid a data breach can learn new ways to protect assets in our Data Security and Privacy track.
Tristan Bishop
Those wanting to go live with cloud integration quickly attend the Cloud track
Tristan Bishop
And, of course, those struggling to transition from traditional data management to big data analytics are heading to the #BigDataReady Summit.
Matt Healey
@KnowledgeBishop There is so much insight that companies can gain simply by integrating all of the existing data never mind getting new data
John Furrier
the schedule looks fantastic looking forward to being there
Amit Walia
@MHealey_Neur Now take MDM and accentuate that with additional data from big data and you get true relevant business insights. See that next week at #INFA15 keynote session #bigdataready
Tristan Bishop
@MHealey_Neur The power of learning how to "know what you know" can't be underestimated
Matt Healey
@amit_walia Will be there. What I want people to keep in mind is do NOT forget the integration of existing data
Prash Chan
@MHealey_Neur @KnowledgeBishop I think the key is to learn from others experience. We have 37 sessions where customers, partners and product expersts are speaking at #INFA15 http://blogs.informa...
Tristan Bishop
Also, regarding open source, yes, there will be much to learn about #Hadoop etc
John Haddad
there are many sessions on #BigData at #INFA15 including the #BigDataReady Summit. For a list of all the Big Data related activities at Informatica World see my blog at http://infa.media/1Ik3OEq
Matt Healey
@MDMGeek The customer panels are always the most interesting from my perspective. I also love just hanging around the bar/lunch tables listening to customer talk
Philip Russom
& @JohnM_Haddad
-- Speaking of the #BigDataReady Summit at #INFA15, I'll have a short cameo appearance at the end of the summit. And I'll have my own speech next Thursday in DI track. I hope to see you all there!
Ash Parikh
@prussom looking forward to it
Prash Chan
@MHealey_Neur Yup, can't waste a tiny bit of time when at #INFA15. Every conversation is a new insight.
John Haddad
@MHealey_Neur There are several customer panels at #INFA15. In the #BigDataReady Summit is a panel on "The Big Data Journey: Traditional BI to Next Gen Analytics" and in the Architecture track there is a panel on "Data Lake Architecture"
Jeff Frick
@MHealey_Neur > And Truth in Context
Matt Healey
@JeffFrick The unbiased, unscripted conversation can be the most intersing