SlideShare a Scribd company logo
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's Security
Autonomous Security: How to use
Big Data, Machine Learning and AI
to build the Security of the future
Lenin Aboagye
Chief Security Architect , Kogni
President, Limit+
&
Avinash Ramineni
Kogni
Agenda
● Today’s Security Landscape
● SAO & Risk Landscape
● Transitioning from SAO to SOAR
● Threat and Response Automation
● Beyond SOAR
● AI & ML History and Application
● Use-Case: Applying AI & ML in Data Centric Security
Today’s Security Landscape
Forrester defines SAO as:
Technology products that provide automated, coordinated, and
policy-based action of security processes across multiple
technologies, making security operations faster, less error-prone,
and more efficient
SAO Addresses Half of Security Challenges
Base: 1,700 Security technology decision-makers (1,000+ employees) Source: Forrester Data Global
Business Technographics Security Survey, 2017
Exploding Threats - Exploding Tools - Exploding Costs = Exploding
Breaches
● The increase is security budgets continue to have
very limited success in addressing Exploding Costs
● Anthem =16 million, Google EU Fine, Facebook stock
drop, Google+ Fine and discontinuation
● Security Tools and Technologies still built to address
Legacy risks
● More claims and hype , many unproven when it
comes to Big Data & AI/ML..
● More difficult to fine-tune and make workable
Typical Incident Response Process - Manual
Typical Incident Response Process - Automated
Optimizing Security - Greater Efficiency
History of Autonomous Vehicles
Security Orchestration Automation and Response
Levels of Automation in Car Industry
Threat Automation Levels in Security
Beyond SOAR = Autonomous Security
● Predictive Intelligence-Anticipating the next breach , several days, months before it actually happens and automatically
build and simulate Orchestration|Automation|Response
● Leverage information intelligence sharing where threats can be simulated and identified before they become
vulnerabilities in your environment
● What if your risk was continuously predicted and your defenses consistently bolstered driven by Big data , ML and AI
Can we talk before we get breached?
Big Data->AI/ML->Deep Learning->Better Security
AI-Human Intelligence exhibited by Machines
Machine Learning-Using algorithms to parse data,
learn from it, and then make a determination or
prediction about something in the world.
Deep learning -Machine learning method based on
learning data representations, as opposed to task-
specific algorithms. Learning can be supervised,
semi-supervised or unsupervised
Future Concepts-Bringing Intelligence to Compute systems
Use-Case: Applying AI in Data Centric Security
Build an extremely accurate , efficient and scalable solution to
autonomously identify and protect sensitive data across
enterprise workloads
Changing Data Landscape
Data Centric Security Gaps
Legacy tools not built to address modern data challenges
Paradigm Shift | Data Centric Security
4 Pillars of Data Centric Security
● What data do you have?
● Where is the data stored?
● Who is accessing the data?
● Whose data it is?
AI in Data Security
● Data Discovery
● Data Classification
● Document Recognition
● Behavioral Analytics
● Intelligent Data Protection
● Data Monitoring
DATA CENTRIC SECURITY NEEDS
AI to reduce false positives &
automate remediation
To properly protect data you have to
properly identify and classify it
Automatic Data Discovery and Classification | Document Recognition
Automatic Data Discovery and Classification | Image Classification
Automatic Data Discovery and Classification | Automatic Pattern
Learning
Changing Data Patterns
• Using Structured data to improve accuracy
in unstructured data
• Clustering and Association rule mining
• Sensitive Data leakage detection
• MinHash
• Locality sensitive hashing
• Bloom filter
Automatic Data Discovery and Classification | Graph Learning
Disambiguate using Graph Learning
Sydney
Person?
City?
Automatic Data Discovery and Classification | NLP
User and Entity Behavior Analytics | Anomaly Detection
Monitoring for dangerous Data Access Patterns
Data Subject Catalog | CCPA & GDPR
AI / ML Based System | Continuous Learning
DEMO
QUESTIONS
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's Security
Data Classification Techniques
Ad

More Related Content

What's hot (20)

Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteOperationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Interset
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2016
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
isicg - 3 r's v4
isicg - 3 r's v4isicg - 3 r's v4
isicg - 3 r's v4
Elliott Franklin
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
Laura Vanassche
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
Greenway Health
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security Roadmap
Austin Songer
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
Anshu Gupta
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
How to perform Secure Data Labeling for Machine Learning
How to perform Secure Data Labeling for Machine LearningHow to perform Secure Data Labeling for Machine Learning
How to perform Secure Data Labeling for Machine Learning
Skyl.ai
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
xband
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
novemberchild
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
SPI Conference
 
How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...
Aladdin Dandis
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
Interset
 
A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world
Ashish Kumar Thakur
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Sirius
 
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteOperationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Interset
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2016
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
Greenway Health
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security Roadmap
Austin Songer
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
Anshu Gupta
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
How to perform Secure Data Labeling for Machine Learning
How to perform Secure Data Labeling for Machine LearningHow to perform Secure Data Labeling for Machine Learning
How to perform Secure Data Labeling for Machine Learning
Skyl.ai
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
xband
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
novemberchild
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
SPI Conference
 
How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...
Aladdin Dandis
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
Interset
 
A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world A survey on artificial neural networks in cyber world
A survey on artificial neural networks in cyber world
Ashish Kumar Thakur
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Sirius
 

Similar to Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's Security (20)

Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology
 
Modern Methods for Managing Data Security
Modern Methods for Managing Data SecurityModern Methods for Managing Data Security
Modern Methods for Managing Data Security
Enterprise Knowledge
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Interset
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
Dean Iacovelli
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
SafeNet
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning

Cloudera, Inc.
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
Peter Wood
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
Sandip Juthani
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
Accenture Technology
 
Role of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdfRole of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdf
imoliviabennett
 
Health IT and Information security by Manish Tiwari
Health IT and Information security by Manish TiwariHealth IT and Information security by Manish Tiwari
Health IT and Information security by Manish Tiwari
Apollo Hospitals Group and ATNF
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
Softchoice Corporation
 
Role of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdfRole of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdf
SoluLab1231
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data security
balasahebcomp
 
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Austin Joy
 
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
HawkShield
 
AI in Cybersecurity.asfasfasfasfadsfsdda
AI in Cybersecurity.asfasfasfasfadsfsddaAI in Cybersecurity.asfasfasfasfadsfsdda
AI in Cybersecurity.asfasfasfasfadsfsdda
The Web Desniger
 
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
infosprintseo
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology
 
Modern Methods for Managing Data Security
Modern Methods for Managing Data SecurityModern Methods for Managing Data Security
Modern Methods for Managing Data Security
Enterprise Knowledge
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Interset
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
Dean Iacovelli
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
SafeNet
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning

Cloudera, Inc.
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
Peter Wood
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
Sandip Juthani
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
Accenture Technology
 
Role of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdfRole of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdf
imoliviabennett
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
Softchoice Corporation
 
Role of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdfRole of Generative AI in Cybersecurity.pdf
Role of Generative AI in Cybersecurity.pdf
SoluLab1231
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data security
balasahebcomp
 
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Austin Joy
 
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
HawkShield
 
AI in Cybersecurity.asfasfasfasfadsfsdda
AI in Cybersecurity.asfasfasfasfadsfsddaAI in Cybersecurity.asfasfasfasfadsfsdda
AI in Cybersecurity.asfasfasfasfadsfsdda
The Web Desniger
 
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
infosprintseo
 
Ad

More from Avinash Ramineni (10)

Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
Avinash Ramineni
 
Winning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscapeWinning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscape
Avinash Ramineni
 
Building zero data loss pipelines with apache kafka
Building zero data loss pipelines with apache kafkaBuilding zero data loss pipelines with apache kafka
Building zero data loss pipelines with apache kafka
Avinash Ramineni
 
Effectively deploying hadoop to the cloud
Effectively  deploying hadoop to the cloudEffectively  deploying hadoop to the cloud
Effectively deploying hadoop to the cloud
Avinash Ramineni
 
Practical guide to architecting data lakes - Avinash Ramineni - Phoenix Data...
Practical guide to architecting data lakes -  Avinash Ramineni - Phoenix Data...Practical guide to architecting data lakes -  Avinash Ramineni - Phoenix Data...
Practical guide to architecting data lakes - Avinash Ramineni - Phoenix Data...
Avinash Ramineni
 
MongoDB Replication fundamentals - Desert Code Camp - October 2014
MongoDB Replication fundamentals - Desert Code Camp - October 2014MongoDB Replication fundamentals - Desert Code Camp - October 2014
MongoDB Replication fundamentals - Desert Code Camp - October 2014
Avinash Ramineni
 
HBase from the Trenches - Phoenix Data Conference 2015
HBase from the Trenches - Phoenix Data Conference 2015HBase from the Trenches - Phoenix Data Conference 2015
HBase from the Trenches - Phoenix Data Conference 2015
Avinash Ramineni
 
Strata+Hadoop World NY 2016 - Avinash Ramineni
Strata+Hadoop World NY 2016 - Avinash RamineniStrata+Hadoop World NY 2016 - Avinash Ramineni
Strata+Hadoop World NY 2016 - Avinash Ramineni
Avinash Ramineni
 
Log analysis using Logstash,ElasticSearch and Kibana
Log analysis using Logstash,ElasticSearch and KibanaLog analysis using Logstash,ElasticSearch and Kibana
Log analysis using Logstash,ElasticSearch and Kibana
Avinash Ramineni
 
Event Driven Architectures
Event Driven ArchitecturesEvent Driven Architectures
Event Driven Architectures
Avinash Ramineni
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
Avinash Ramineni
 
Winning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscapeWinning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscape
Avinash Ramineni
 
Building zero data loss pipelines with apache kafka
Building zero data loss pipelines with apache kafkaBuilding zero data loss pipelines with apache kafka
Building zero data loss pipelines with apache kafka
Avinash Ramineni
 
Effectively deploying hadoop to the cloud
Effectively  deploying hadoop to the cloudEffectively  deploying hadoop to the cloud
Effectively deploying hadoop to the cloud
Avinash Ramineni
 
Practical guide to architecting data lakes - Avinash Ramineni - Phoenix Data...
Practical guide to architecting data lakes -  Avinash Ramineni - Phoenix Data...Practical guide to architecting data lakes -  Avinash Ramineni - Phoenix Data...
Practical guide to architecting data lakes - Avinash Ramineni - Phoenix Data...
Avinash Ramineni
 
MongoDB Replication fundamentals - Desert Code Camp - October 2014
MongoDB Replication fundamentals - Desert Code Camp - October 2014MongoDB Replication fundamentals - Desert Code Camp - October 2014
MongoDB Replication fundamentals - Desert Code Camp - October 2014
Avinash Ramineni
 
HBase from the Trenches - Phoenix Data Conference 2015
HBase from the Trenches - Phoenix Data Conference 2015HBase from the Trenches - Phoenix Data Conference 2015
HBase from the Trenches - Phoenix Data Conference 2015
Avinash Ramineni
 
Strata+Hadoop World NY 2016 - Avinash Ramineni
Strata+Hadoop World NY 2016 - Avinash RamineniStrata+Hadoop World NY 2016 - Avinash Ramineni
Strata+Hadoop World NY 2016 - Avinash Ramineni
Avinash Ramineni
 
Log analysis using Logstash,ElasticSearch and Kibana
Log analysis using Logstash,ElasticSearch and KibanaLog analysis using Logstash,ElasticSearch and Kibana
Log analysis using Logstash,ElasticSearch and Kibana
Avinash Ramineni
 
Event Driven Architectures
Event Driven ArchitecturesEvent Driven Architectures
Event Driven Architectures
Avinash Ramineni
 
Ad

Recently uploaded (20)

machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Cyntexa
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Cyntexa
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
MEMS IC Substrate Technologies Guide 2025.pptx
MEMS IC Substrate Technologies Guide 2025.pptxMEMS IC Substrate Technologies Guide 2025.pptx
MEMS IC Substrate Technologies Guide 2025.pptx
IC substrate Shawn Wang
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Cyntexa
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Cyntexa
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
MEMS IC Substrate Technologies Guide 2025.pptx
MEMS IC Substrate Technologies Guide 2025.pptxMEMS IC Substrate Technologies Guide 2025.pptx
MEMS IC Substrate Technologies Guide 2025.pptx
IC substrate Shawn Wang
 

Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's Security

  • 2. Autonomous Security: How to use Big Data, Machine Learning and AI to build the Security of the future Lenin Aboagye Chief Security Architect , Kogni President, Limit+ & Avinash Ramineni Kogni
  • 3. Agenda ● Today’s Security Landscape ● SAO & Risk Landscape ● Transitioning from SAO to SOAR ● Threat and Response Automation ● Beyond SOAR ● AI & ML History and Application ● Use-Case: Applying AI & ML in Data Centric Security
  • 4. Today’s Security Landscape Forrester defines SAO as: Technology products that provide automated, coordinated, and policy-based action of security processes across multiple technologies, making security operations faster, less error-prone, and more efficient
  • 5. SAO Addresses Half of Security Challenges Base: 1,700 Security technology decision-makers (1,000+ employees) Source: Forrester Data Global Business Technographics Security Survey, 2017
  • 6. Exploding Threats - Exploding Tools - Exploding Costs = Exploding Breaches ● The increase is security budgets continue to have very limited success in addressing Exploding Costs ● Anthem =16 million, Google EU Fine, Facebook stock drop, Google+ Fine and discontinuation ● Security Tools and Technologies still built to address Legacy risks ● More claims and hype , many unproven when it comes to Big Data & AI/ML.. ● More difficult to fine-tune and make workable
  • 7. Typical Incident Response Process - Manual
  • 8. Typical Incident Response Process - Automated
  • 9. Optimizing Security - Greater Efficiency
  • 12. Levels of Automation in Car Industry
  • 14. Beyond SOAR = Autonomous Security ● Predictive Intelligence-Anticipating the next breach , several days, months before it actually happens and automatically build and simulate Orchestration|Automation|Response ● Leverage information intelligence sharing where threats can be simulated and identified before they become vulnerabilities in your environment ● What if your risk was continuously predicted and your defenses consistently bolstered driven by Big data , ML and AI
  • 15. Can we talk before we get breached?
  • 16. Big Data->AI/ML->Deep Learning->Better Security AI-Human Intelligence exhibited by Machines Machine Learning-Using algorithms to parse data, learn from it, and then make a determination or prediction about something in the world. Deep learning -Machine learning method based on learning data representations, as opposed to task- specific algorithms. Learning can be supervised, semi-supervised or unsupervised
  • 18. Use-Case: Applying AI in Data Centric Security Build an extremely accurate , efficient and scalable solution to autonomously identify and protect sensitive data across enterprise workloads
  • 20. Data Centric Security Gaps Legacy tools not built to address modern data challenges
  • 21. Paradigm Shift | Data Centric Security
  • 22. 4 Pillars of Data Centric Security ● What data do you have? ● Where is the data stored? ● Who is accessing the data? ● Whose data it is?
  • 23. AI in Data Security ● Data Discovery ● Data Classification ● Document Recognition ● Behavioral Analytics ● Intelligent Data Protection ● Data Monitoring DATA CENTRIC SECURITY NEEDS AI to reduce false positives & automate remediation To properly protect data you have to properly identify and classify it
  • 24. Automatic Data Discovery and Classification | Document Recognition
  • 25. Automatic Data Discovery and Classification | Image Classification
  • 26. Automatic Data Discovery and Classification | Automatic Pattern Learning Changing Data Patterns • Using Structured data to improve accuracy in unstructured data • Clustering and Association rule mining • Sensitive Data leakage detection • MinHash • Locality sensitive hashing • Bloom filter
  • 27. Automatic Data Discovery and Classification | Graph Learning Disambiguate using Graph Learning Sydney Person? City?
  • 28. Automatic Data Discovery and Classification | NLP
  • 29. User and Entity Behavior Analytics | Anomaly Detection Monitoring for dangerous Data Access Patterns
  • 30. Data Subject Catalog | CCPA & GDPR
  • 31. AI / ML Based System | Continuous Learning
  • 32. DEMO
  翻译: