
John Furrier32

















On average, it takes 156 days for a computer security breach to be detected. How can big data change this?

Ash Parikh
the real question to ask is - what is needed to handle these breaches? #INFA15 #bigdataready

Matt Healey
Big data has to be the foundation that analytics are built on to address the issues. Clearly better analytics are needed becayse 156 days is way too long

John Haddad
Ingesting real-time machine logs from systems across the enterprise simultaneously into a data lake and real-time event stream you can begin to uncover and act upon new security breach patterns much faster.

John Furrier
@JohnM_Haddad bringing data together is also something I'd add to your comment bc then the ability to see patterns across data sets becomes viable; oh yeah near real time is good

Tristan Bishop
A solid data management foundation can reduce the risk of any new Big Data project

John Haddad
Let’s face it, security breaches will happen, so what are you doing to protect sensitive data at the source? It is important to be able to know where sensitive data resides and then mask/obfuscate data to protect it in case of a breach

Amit Walia
Data Security Intelligence. Its all about understanding data before you enforce any controls #BigDataReady #secureatsource

Amit Walia
Learn more at secureatsource.me

Matt Healey
Being able to mask data is critical. You can not continue to allow people to get access to all of the data becuase they need some of it

Ash Parikh
@Amit_Walia per a report by #TDWI data security is a critical success factor to become #BigDataReady http://tdwi.org/rese...

Amit Walia
@MHealey_Neur Agree on the foundation. But need to understand sensitive data from the pool of data before you put any controls. #BigDataReady #secureatsource

Matt Healey
@Amit_Walia true. in my thought the foundation involves big data, and part of that is an understanding of the data

John Haddad
Automated data discovery can detect where sensitive data resides in a pool (or lake) of data. This is the first step of data governance (i.e. securing your data) #BigDataReady #secureatsource

Amit Walia
@MHealey_Neur Agree. That's where we need to discover, profile, and classify sensitive data from the vast pool of big data. This is Step 1

Amit Walia
Step 2 is to understand the proliferation of sensitive data. Each step increases risk exponentially #secureatsource #bigdataready

Amit Walia
Then layer on top user access patterns and behavior #bigdataready #secureatsource

John Haddad
Data security intelligence is key to answering critical questions like: where is my sensitive data, is it protected, where does it reside, who has access and who uses it, what happens if stolen, etc. #BigDataReady #secureatsource #INFA15

Amit Walia
Then use rules, machine learning and predictive modeling to apply relevant security controls #secureatsource #bigdataready