juan_gandhi: (Default)
[personal profile] juan_gandhi
Susan Mauldin.
Susan: “Big data for security, it's an important concept for us. It was really nothing more than network monitoring before security really became its own profession but even then, you had network analysts who were analyzing packets all the time and looking at firewall logs and proxy traffic and so forth. That was really sort of big data at the time. Now, though, we have so many alerts and logs and access control information that there is information coming from every device on the network, and it’s all IP addressable. 
 
Everything that is IP addressable sends us some kind of information to be inspected, so it is not unusual for a security team to have a terabyte of data to sort through in a week. With this data, we’re looking for the needle in the haystack… the anomaly that shows something is not quite right. Our big data challenge is how to sort through all of that data quickly and in a manner that satisfied the use case that we are looking for.”

“Generically, every breach has the big data problem. For example, in a malware incident that results in a breach, the malware comes in and spreads across the environment. It’s trying to map your environment to see what's there. In doing so, it touches a number of systems, all of which have logs and alerts in which the security team needs to review. Each IP addressable device has data regarding the packets, how it’s been used, who has been accessing it, etc. Depending on the severity of the breach, the security team may have to interview several people during the investigation… and then the scope expands.  
 
When that scope expands, the security team typically has to deal with a sudden increase in big data -- logs, alerts, etc. -- making budget planning critical. Right now I'm planning my budget for next year, and I hope I ask for enough disk space and computing power so that the infrastructure is prepared for future attacks. Waiting 24 hours for the next change window is a very hard problem to have, given the CEO and Board are seeking fast answers. Burst capacity is really critical for the security team who needs to find answers quickly.”

src

The kind of people that are responsible for maintaining data security for most of our country.

Snowden and Manning at least knew what they were doing.

Date: 2017-09-11 12:35 am (UTC)
1master: (Default)
From: [personal profile] 1master
chief security musician это пять

Date: 2017-09-11 12:57 am (UTC)
From: [personal profile] marooned_in_paradise
https://www.boardroominsiders.com/executive-profiles/1006308/Equifax,-Inc./Susan-Mauldin

Mauldin graduated with a BA in music composition and a Master of Fine Arts degree in music composition both from University of Georgia.

Date: 2017-09-11 03:12 am (UTC)
1master: (Default)
From: [personal profile] 1master
Я знаю, собственно, без этого знания так смешно не было бы

Profile

juan_gandhi: (Default)
Juan-Carlos Gandhi

June 2025

S M T W T F S
1 2345 6 7
8 9 10 11 121314
15161718 1920 21
22232425262728
2930     

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 22nd, 2025 01:58 pm
Powered by Dreamwidth Studios