Comments
Big-Data Analytics & Our Cyberdefense
You must login to participate in this chat. Please login.

finally audio after having to switch to IE

Prospector

still no audio on firefox

 

Prospector

I had to miss the live show. Enjoying Listening to the re-play and reading the chat comments. Thanks y'all

Data Doctor

Had to miss the last part but otherwise it was a great show

Master Analyst

Great session. Thank you.  I wasn't able to join'live' but appreciate the replay very much.  My takeaway:  Traditional BI is primarily historic oriented - in other words, reporting looks at data to learn what happened.  Analytics help organizations use thier data to answer the question why something happened.  While many technologies exist that help organizations use their data to determine what's going to happen, network patterns and activity require new big data technologies for the simple reason the data meets the big data requirements of volume, velocity, variety and complexity. For Cyber Security and Defense, big data analytics provide that visibility to network patterns. 

Prospector

ty for thoughts and discussion on during today's topics

Prospector

really loved learning everything said. thanks for this presentation

Prospector

great show :)

Prospector

Thank you for another great show!

Prospector

Thanks All

 

Prospector

2 minutes into the presentation, I got a call I had to take - just finished!

Beth or Noreen, please make sure to post a link for replay.

The one question I had in mind at the start, was about BigData analytics bing used by the bad guys against the good guys.  That may well have been addressed; but if not, would have liked to hear their comments.

Thanks.

Prospector

Thank you for the webcast!

Prospector

Thanks for a very worthwhile hour, A2! Cy'all soon.

Prospector

Thanks everyone

Prospector

Beth - again, thank you and the sponsor for hosting us today.  --Sam

Prospector

Or you can get the survey and the corresponding infographic at this link too http://www.teradata.com/cybersecurity-threat/

 

Prospector

How does the Cyber security play in the Cloud technology environment?

Prospector

Is there a first step that all companies should take when exploring ways to leverage big data for cyber security?

Prospector

The risks vary by industry based on the IP or other assets they have to lose.

Prospector

Larry & Sam, any closing thoughts for our audience (like where they can get a copy of the report?)

Blogger

are the risks equal across industries - or do say financial firms have greater risks?

A very informative session.

Prospector

Beth - Thank you for hosting us today.

Prospector

 are expertise and technology in sync at this point?

Yes, to some degree.  Some firms in the survey had big data analytics in use.  Others are taking the steps to make it happen.  So, in general, expertise and technology are in synch.

Prospector

Listeners -- do we have any additional questions for our guests? 

Blogger

Sam, regarding to your point "TEchnology and expertise are joined.  A firm must have expertise to use the technology" -- are expertise and technology in sync at this point?

Blogger

Any other questions?

Prospector

Which is the bigger issue here, technology or expertise, in terms of an enterprise's ability to incorporate big-data analytics for cyber defense?

 

TEchnology and expertise are joined.  A firm must have expertise to use the technology.

Prospector

It is only a batch process at this time

Prospector

Hadoop is the big data data store.

Prospector

Getting non-IT executives to provide buy-in is tough.  I think a return on prevention framework (not ROI) is the based way to argue the value of big data anaytics in security.

Prospector

Well, I have been talkng to companies implementing Hadoop and what I learnt is that indeep Hadoop can be a big data store, but currently there are no tools that help Hadoop in real-time analytics. The research is ON.

 

Look for solutions that provide access to the H Catalogue with SQL syntax.

Prospector

Which is the bigger issue here, technology or expertise, in terms of an enterprise's ability to incorporate big-data analytics for cyber defense?

Blogger

Hadoop is the big data data store.

Prospector

Well, I have been talkng to companies implementing Hadoop and what I learnt is that indeep Hadoop can be a big data store, but currently there are no tools that help Hadoop in real-time analytics. The research is ON.

Prospector

So Sam, regarding "getting buy-in," is that a good way to start -- pitching this as not only a security solution but one for improved network performance, too?

 

Absolutely.  There are other data reuse and cost sharing opportunities.  Anti-Fraud, Data Lineage, etc.

Prospector

Hadoop is the big data data store.

Prospector

Thanks for the presentation. Learn a lot.

Prospector

So Sam, regarding "getting buy-in," is that a good way to start -- pitching this as not only a security solution but one for improved network performance, too?

Blogger

I agree with Noreen.  It is hard to get employees to take basic steps such as locking down mobile devices.

Prospector

Hadoop ?? Yes, it manages big data? But can it help in real time analytics? NO

There are tools that can rapidily query Hadoop and then execute analytics, so Hadoop can be part of the architecture.

Prospector

Thanks for the discussion!

Prospector

Hadoop is the big data data store.

Prospector

Question: It's one thing for the IT security team to agree that big-data analytics for cyber security makes sense. But what about others in the organization? How big of an investment does this take, and what advice do you have to share for how to get buy-in?

 

There are data reuse opportunities.  For example the network operations group can use the same data as the security group.  This allows cost sharing.

Prospector
One tool is big data supplier
Prospector

Hi Noreen

In my experience, a large number of companies hire former hackers (now white hats) to test security infrastructure and applications.  I don't have a total or percentage figure, but I'll guess at least 30% of Fortune 500.

Prospector

Hadoop ?? Yes, it manages big data? But can it help in real time analytics? NO

Prospector

Splunk I've heard of. I'll have to check out Narus and Novetta.

Blogger

You have to get employees to stop complaining about having their computers liocked down!

Hadoop is the big data data store.

Prospector

Very informative, thanks

Prospector

Could Big Data or Database system and analysis be able to keep separately from other networks to avoid cyber attack?

Prospector

How many organizations hire hackers to say ahead of the dangers?

Many firms hire White Hat Hackers for Pen testing.

Prospector

Yes, Google's MapReduce is one meant for this task

Prospector

Question: It's one thing for the IT security team to agree that big-data analytics for cyber security makes sense. But what about others in the organization? How big of an investment does this take, and what advice do you have to share for how to get buy-in?

Blogger

Hadoop is the big data data store.

Prospector

very informative presentation,thank you

Prospector

In the security space, there are several vendors with big data solutions including Narus, Novetta, Splunk, etc.

Prospector

How many organizations hire hackers to say ahead of the dangers?

Thanks Noreen!

Prospector

Hi Sam

Can you provide a list of technologies available today -- such as Narus?

Prospector

MapReduce it the common big data analytic for sessionization, path and graph analysis

Prospector

(And, by the way, thanks everybody for tuning in. Post your questions for Larry & Sam now!)

Blogger

Larry & Sam, I believe we had an earlier question on the boards here, that being: What tools/technologies are available today to perform Big Data Analytics? 

Would one of you like to address that?

 

Blogger

Thanks Beth! Great questions and responses

Prospector

thanks for the great show and the information.

Prospector

Thanks for the show. It just ended.

Prospector

Thanks.  Great information.

Prospector

Kudos once again, A2.

Prospector

Hi Beth and Larry - Looking forward to text questions.  --Sam

Prospector

Thank you for the information and presentation--

Prospector

thanks for the show!

Prospector

Yeah, very Good Broadcast!!!  Thanks Beth and Gang!

Prospector

Thanks a bunch for this. Great job!!

 

Prospector

Thanks Mfwoolfolk Please make sure to take the poll so we can tally your response

Noreen - to answer your poll question, I think it is extremely difficult for most companies to pick a big data supplier, because there is so much hype around big data in the marketplace and the technologies associated with Big Data like Hadoop. 

Prospector

Being unsecure can be very costly.

Prospector

Quick Poll

How easy is it to pick a big-data supplier?

There is also an infographic that corresponds with the survey being discussed today  http://www.teradata.com/WorkArea/linkit.aspx?LinkIdentifier=id&ItemID=12884902313&libID=12884902320

 

Prospector

Hey folks-while you are here, please take the survey to the right

 

@Noreen -- everyone engages in risky behavior... One of the most common is re-using passwords across multple sites, and storing those passwords electronically

Prospector

@Noreen -- engage in risky behavior? Yes...it's called turning the system on. :)

Prospector

BYOD hugely adds to the mobile problem, because you don't control the end-user device, and that device is currently the hottest attack vector

Prospector

Security is akin to some other facets of life -- we sometimes talk about it so much, we think we've done it.

Prospector

Be honest: Do you take risky behaviors that could make it easier for an attack on your network?

Do you think BYOD adds to the mobile problem?

the greatest areas of cyber security risk are mobile access (either through
mobile devices such as smart phones and mobile/remote employees), lack of system
connectivity/visibility and multiple global interconnected network systems.

Protection is only defensive. The attacts are all direction one even won't  dream of.

 

Prospector

Diving in as advised. :)

 

Prospector

What tools/technologies are available today to perform Big Data Analytics?

Prospector

tshake - what is your question?

Most major vendors in the data warehouse space like Teradata can manage the huge volumes.  With technologies like map reduce, it is getting easier for analyst to leverage these tools.

 

Prospector

there is no 100% protection.

Prospector

who participated in the survey you reference?

Master Analyst

"Big data analytics can bridge the existing gap between technology and people in cyber defense through big data tools and techniques which capture, process and refine network activity data and apply algorithms for near-real-time review of every network node. A benefit of big data analytics in cyber defense is the ability to more easily recognize patterns of activity that represent network threats for faster response to anomalous activity."

Do you need separate big-data analytics packages to analyze security data, or do the major vendor tools have adequate analytics capabilities to manage the huge volumes of log data to be analyzed?

Prospector

You think you're safe. You're not.

Prospector

"While data growth and complexity are explosive factors in cyber defense, new big data tools and data management techniques are emerging that can efficiently handle the volume and complexity of IP network data," Dr. Larry Ponemon has said.

Big data analytics with security technologies ensure a stronger cyber defense. Eighty-two percent would like big data analytics combined with anti-virus/anti-malware; 80 percent say anti-DoS/DDoS would make their organizations more secure.

Less than half of organizations are vigilant in preventing (42 percent) anomalous and potentially malicious traffic from entering networks or detecting such traffic (49 percent) in their networks.

Other findings:

Fifty-six percent are aware of the technologies that provide big data analytics and 61 percent say they will solve pressing security issues, but only 35 percent have them. The 61 percent say big data analytics is in their future.

The greatest areas of cyber security risk are caused by mobility, lack of visibility and multiple global interconnected network systems.

The new study shows only 20% of organizations say that they are more effective at stopping them.

"safe" is a term that doesn't have a single answer... The better question would be "Is dropbox acceptable for what I need to do with it, in this business context.

 

Prospector

Is there cyber police?

Prospector

@billve..agreed. ignorance and hubris is a lethal combo

Prospector

easy to ignore the problem until a breach

President Obama has declared that the "cyber threat is one of the most serious economic and national security challenges we face as a nation" and that "America's economic prosperity in the 21st century will depend on cybersecurity."

Prospector

Every client with whom I've ever worked under-estimates the risks, and over-estimates their ability to figure it out on the fly if something happens.

 

Prospector

yes, good point

Prospector

Are drop-box and gotomypc safe?  

Prospector

especially since we only need what - like 4 data points to identify someone?

jfowler528

Please try another browser or try listening from your phone-may have better reception

All data has value to someone.  What may not be important to you can be profitable to hackers.

Prospector

I am having a difficut time keepin ght audio running it keeps stopping and I have to log out and back in to get it to run

 

Prospector

3 yrs? If so, Noreen, some pretty good hackers. Goodness.

Prospector

Kaythl - could be your network

 

Here is the link to the Ponemon research survey being discussed today

http://www.teradata.com/cybersecurity-threat/

Prospector

that's a long time to be oblivious

I wrote recently about a company that only discovered a breach three years after the fact

audio is not working well; it is stopping several times.

Prospector

Agree that it is very important for Cyber defence

Prospector

Coming through fine here, after a few refreshes ...

Prospector

True, Norreen -- for far too many, "security" is thought about only after "wth happened?" is heard.

Prospector

It's just so cheap to engineer an attack

ok, the audio is working now.

Prospector

any stories about security issues out there?

 

good audio on my line!

Prospector

audio is fine here.

Prospector

any technology created -- someone can break

and you have to wonder why

security is so often an afterthought!

audio with noise

Prospector

and refresh your browsers

try your phone in that case

 

remember-some corp firewalls block audio

Please click the audio button at the top of the page

working now after refresh

Prospector

Everything good Sam I Am?

 

audio is clear on firefox here

Prospector

I don't have audio...

Prospector

anyone else got audio issue

Prospector

blog talk radio is 5 by 5 here

Prospector

Sam-I-Am is present

Prospector

sound is good after reload.

Prospector

I just see the audio bar, and the audio is on.

Prospector

worked first time, this time. Cool. I'm now trained.

Prospector

Should be starting soon--enjoy the presentation, one and all!

Prospector

Good luck Beth and Noreen.

Prospector

good afternoon,everybody

Prospector

Look forward to this important presentation!

Prospector

Good morning or afternoon depending where your at

Master Analyst

This is Hang Lau, Just log in to attend the audio chat.

 

Prospector

good afternoon (or morning)

Prospector

Tick Tock... wow, very close.

Prospector

Hello Everyone

Prospector

Half an hour to go.

Prospector

45 minutes till show time!

Prospector

when will audio begin?

 

Prospector

morning everyone

Prospector

Hello to all :)

Prospector

nice being here with all of you

Prospector

reporting for duty

Statistician
Good afternoon peers
Prospector

@Fowler: Yes the broadcast is available on demand later on. This is the case for all presentations on this forum.

Prospector

Will this Big-Data Analytics and Our Cyber Defense be available after the broadcast?  I will not be able to make it but would ove to hear it.

Prospector

Hope this is a good one.

Prospector

Cannot wait for this to begin.

Prospector

less than 2 hours to go!!

Prospector

Greetings, all, from the sunny and breezy Buckeye State.

Prospector

Good morning to everyone!

Prospector

morning, morning morning :)

Prospector

Greetings and salutations all!

Prospector

Good Morning all!

Prospector

Greetings to all!

Prospector

Good Morning all

Prospector

Looking forward to a great show.

Prospector

Mid-week already! Hello everybody.

Prospector

Good morning to all.

Prospector

hello everyone !!

Prospector

good morning to all

Prospector

good morning

 

Prospector

Good Morning Everyone!

Prospector

Good morning!

Prospector

6 More hours to go :)

Prospector

Here we are with a topic that crossed all industries and one that everyone must be up to date on to succeed.

Prospector

See you tomorrow!

Prospector

Good Mornings.

Prospector

good morning

Prospector

have a nice weekend everyone

Prospector

Good afternoon all..

Prospector

Look forward to next week's presentation!  Have good weekends in the meanwhile--

Prospector

Looking forward to learning more on this, impress me!

Prospector

Will be here in no time!

Prospector

Since are now and information based society security is necessary.

Prospector

looking forward to this presentation

 

Prospector

hope to attend :)

Prospector

Hello to all

Prospector

HELLO.........

Prospector

This is a hot issue for us right now.

 

Prospector

Want to understand the analytics piece and see what approach taken.

Prospector

This will be great!

Prospector

Hello

All

 

Prospector
Good morning
Prospector
Should be a great chat
Prospector

Looking forward to this webinar!

Prospector

Happy Friday everyone!

Prospector

good morning

Prospector

See ya! Looking forward to it!

Prospector

Good morning, all.  See you next week on the call.

Prospector

good day.  just signed up

 

Prospector

Greetings and salutations all!

Prospector

Hope I can make it live Wed.

Presenters are top notch.

If you have thoughts on Radio Show format, you can post them here: 

http://www.allanalytics.com/messages.asp?piddl_msgthreadid=265531      (Readerboard post).

Prospector
Cy'all on Wednesday.
Prospector

hope to attend

Prospector

should be interesting

Prospector

Hello to all

Prospector

looking to join you next week!

Prospector

Very important topic

Prospector

Looking forward to the chat

Prospector


INFORMATION RESOURCES
ANALYTICS IN ACTION
CARTERTOONS
VIEW ALL +
QUICK POLL
VIEW ALL +