![Page 1: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/1.jpg)
Big Data in Cyber Security
Terry L. Janssen, Ph.D.Chief Scientist
& Cyber Strategist
![Page 2: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/2.jpg)
1. Identity Management
Driver’sLicenses
News/Social Media
CreditReports
CriminalRecords
Physical Addresses
Phone #s/URLs/Email Addresses
SSN/Birth/Marriage
Certificates
Biometrics
PIV
![Page 3: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/3.jpg)
2. Fraud Detection & Prevention
Source http://money.cnn.com/2013/07/09/technology/security/cybercrime-bank-robberies/index.html
![Page 4: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/4.jpg)
3. Governance, Risk & Compliance
Source National Cybersecurity Center, 2013
![Page 5: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/5.jpg)
4. Security Management
Source AT&T 2013
![Page 6: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/6.jpg)
Reported Incidents of Data Loss
YearSource: DataLossDB.orgOpen Security Foundation
![Page 7: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/7.jpg)
Sampling by Attack Type
Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
2012
![Page 8: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/8.jpg)
Characteristics of SPAM
Source: IBM.comxxxxxxxxx
Week #
Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
![Page 9: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/9.jpg)
SPAM & Phishing Targets
Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
![Page 10: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/10.jpg)
SPAM Origins
Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
![Page 11: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/11.jpg)
Drop of SPAM After Botnet Busts
Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
![Page 12: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/12.jpg)
Reports of Vulnerabilities
Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
![Page 13: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/13.jpg)
Web Vulnerabilities by Attack Vector
Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
![Page 14: Big Data for Cyber Security @ Big Data DC 7-16-2013](https://reader034.vdocuments.us/reader034/viewer/2022051608/54440aceafaf9fa4098b4759/html5/thumbnails/14.jpg)
Big Data for Securing the Future
Questions?