data lakes & leaks erno doorenspleet - iia congres/2017... · erno doorenspleet. 2 ibm security...

22
1 IBM Security Data Lakes & Leaks Erno Doorenspleet

Upload: others

Post on 22-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

1 IBM Security

Data Lakes & Leaks

Erno Doorenspleet

Page 2: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

2 IBM Security

Data Lakes

Leaks

Page 3: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

3 IBM Security

A Data Lake versus A Data Reservoir

Data flows in “naturally” and just sits there Built to extract value from the data

Data without Analytics

is just a liability

Page 4: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

4 IBM Security

DaFont hack leads to theft of

699,000 font-hunters

Font-sharing site DaFont

was breached by a bored hacker in

May. Usernames, email addresses,

and hashed passwords of 699,000

user accounts were stolen in the

breach. The passwords were so

bad that more than 98 percent of

the passwords were cracked.

Leaked TSA documents reveal

litany of airport's security lapses

Documents leaked from a

passwordless backup drive

exposed thousands of documents

relating to the TSA's activities at

Stewart, an international airport

about 60 miles north of

Manhattan. One of the documents

revealed how the airport's security

screeners failed to check names

against the government's "no-fly"

list.

Will it happen to me?

Proving once again that nobody is immune

to data breaches, identity management

company OneLogin has seen customer

details stolen. The firm, which essentially

provides password management services

for businesses, admitted that a "malicious

actor" has taken details relating to its US

customers.

The attack took place on May 31 2017.

"The threat actor was able to access

database tables that contain information

about users, apps, and various types of

keys," the firm continues.

Worryingly, it also says that whoever took

the data may have been able to decrypt it.

OneLogin has not said how many

customers were impacted during the

incident.

Page 5: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

5 IBM Security

More Users

More Data

More Interactions

= More Risk

Page 6: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

6 IBM Security

IT’S ALL BIG DATA: IOT, ANALYTICS, COGNITIVE , CLOUD

Page 7: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

7 IBM Security

Is it Cool, Convenient, or Creepy?

Page 8: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

8 IBM Security

1 in 3Fortune 1000 employees

upload corporate data to cloud apps

Page 9: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

9 IBM Security

Where

is

My Data

Stored?

Page 10: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

10 IBM Security

40% of all data

generated by 2020 will come from

connected sensors

Security is Key!

Internet of Things

Page 11: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

11 IBM Security

Data Privacy Regulations

Page 12: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

12 IBM Security

Do we understand

the risks created by

Humans?

Page 13: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

13 IBM Security

Page 14: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

14 IBM Security

Page 15: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

15 IBM Security

© 2016 IBM CORPORATION

92% of developers

agree with the

statement that

“Security is going to be more an issue in

the future”

Page 16: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

16 IBM Security

A New

Approach for

SECURITY

Page 17: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

17 IBM Security

Have a (good) Treasure Map

Page 18: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

18 IBM Security

What you don’t know can hurt you: Master your risk!

• Create early visibility into potential risks to sensitive data

• Identify specific, high-value business-sensitive data

at risk from internal or external threats

• Build a comprehensive view (processes, procedure,

compliance, ownership, etc.) of sensitive data

• Have the right conversations with IT, Security, and LOB

teams to improve business processes and mitigate risk

Uncover

Act

Analyze

Visualize

Tegan

Page 19: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

19 IBM Security

Discovery, classification,vulnerability assessment, entitlement management

Encryption, masking, and redaction

Data and file activity monitoring

Dynamic blocking and masking, alerts, and quarantine

Compliance automation and auditing

ANALYTICS

Monitor access and Protect data across the enterprise and beyond

Page 20: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

20 IBM Security

A security immune system, integrated and intelligent

Mobile

Fraud Protection

INFORMATION RISKAND PROTECTION

Cloud Security

Identity and Access Management

Data & Appsr

Threat Intelligence

Endpoint Network

Security Eco-System

SECURITY OPERATIONSAND RESPONSE

Security Intelligence

Page 21: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

21 IBM Security

Data Lakes

Leaks

Page 22: Data Lakes & Leaks Erno Doorenspleet - IIA Congres/2017... · Erno Doorenspleet. 2 IBM Security Data Lakes Leaks. 3 IBM Security A Data Lake versus A Data Reservoir Data flows in

22 IBM Security

Data Lakes & Leaks

Erno Doorenspleet

THANK YOU