SlideShare a Scribd company logo
Big Data for Cybersecurity
Mouaz Alnouri
25 March 2021
This Session will be recorded and posted on Skilledfield’s Youtube Channel
About me
I’m Mouaz Alnouri, the Managing Director of Skilledfield.
We help clients unleash the power of big data technology to detect cyber
security events and utilise automation to efficiently alert, escalate and
respond to security threats.
Technologist with years of experience in solving complex business
problems through creative client-centric strategies and value-driven
solutions. A change agent, capable of orchestrating a transformative
business strategy through data-driven decisions.
2
Mouaz leads the Skilledfield
team with an unrivalled passion
for data and a zest for problem
solving. With over a decade in
the IT services industry, he’s
provided intelligent solutions
for complex problems
throughout his career. He’s
worked with major technology
and telecommunications firms
including Telstra and NBN Co.
Limited, where he’s delivered
data focused solutions that
have significantly improved
operational efficiency. He’s a
customer-focused problem
solver that leads the Skilledfield
team towards their vision to
become Australia’s leading Big
Data solutions provider.
https://www.linkedin.com/in/malnouri/
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
What we are covering today
➔ One Slides about Skilledfield
➔ Why Cybersecurity is a Big Data use case
➔ How do we address Cybersecurity as Big Data Professionals
➔ How do we keep up with the emerging cyber threats
➔ Benefits of Big Data Technology for Cybersecurity
3
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
About Skilledfield: A Field of Skilled professionals!
4
Uplift Security Detection and
Response Capability
Uplift Observability Capability BI to AI Analytics Services
● Centralised Security Event
logging and auditing
● Endpoint Protection
● SOAR
● Advanced Security Analytics
● Managed Services
● Centralised Operational event
monitoring and alerting
● AIOps, (Artificial Intelligence for
IT operations)
● Managed Services
● Big Data Analytics using Elastic
● Big Data Analytics using
Databricks
● Big Data Analytics using
Microsoft Azure Services
Solving Complex Problems with Simplified Solutions
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Cybersecurity is Big Data Use Case
5
Volume
High amount of data
generated In terabytes
Velocity
Generated in real-time
in streams, batch or
bits
Variety
Structured,
Unstructured, Semi
structured
Big Data
Use Case
Protect
R
e
s
p
o
n
s
e
&
R
e
c
o
v
e
r
I
d
e
n
t
i
f
y
&
D
e
t
e
c
t
Assessment
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Detection Data Engineering Pipeline
6
Acquire Parse Enrich Analyse Alert
Sources
Tune
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Design Data Analytics Solution
● Comprehend business value chain
● Understand short-term and long-term goals and identify key
business questions
● Define analytics use cases
● Perform an initial assessment of data sources
● Design a solution
7
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Threat Modelling - PASTA (Risk Based)
8
Define
Objectives
Define
Technical
Scope
Application
Decomposition
Threat Analysis
Vulnerability &
Weakness
Analysis
Attack
Modelling
Risk & Impact
Analysis
The Process for Attack Simulation and Threat Analysis
https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf
Potential Threat: Identified, categorized, analysed, prioritise response
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Most Concerning Types of Cyber Threats
9
According to IT security decision makers worldwide as of November 2019. Source:
https://www.statista.com/statistics/500946/worldwide-leading-it-security-threats/
Malware is the most concerning cyberthreat
targeting organizations. Phishing and
ransomware were jointly ranked second.
Over the last two years, the number of insider
incidents has increased by 47%.
30 percent of malware attacks are zero day
exploits
Advanced attackers uniquely compile the
code they bring with them to specifically not
match anything they’ve used elsewhere or
ever will again
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Behavioural Analytics
10
Acquire Parse Enrich Analyse Alert
Sources
Tune
Learn Detect
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Same data. Different questions.
11
Ingest & prepare Alerting and Machine learning Detect, hunt, investigate
Ecosystem of network and host
data connectors used to
orchestrate your data feed from
edge devices.
Processing the data in real-time
and analysing it to identify
threats and detecting abnormal
behaviours.
Ad hoc queries at scale and
interactive threat hunting allows
a rapid event triage and
investigation.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
The DAMA Wheel
12
To use consistent words
and relations which
leads to more alignment
with current and future
requirements
Data lifecycle, data
integrity, data availability
and data usage
performance
Access control,
confidentiality and
regulatory compliance
Data Consolidation and
Data Movement
Endure effective and
efficient storage, retrieval
and use of data
Provide authoritative
source of reconciled and
quality-assessed data
Technical environment
and Technical and
Business Processes
Provide organisational
understanding of
business terms and
usages
Identify Data storage
and processing
requirements
Standards, requirements
and specifications for
data
Principles, policies,
procedures, metrics,
tools and responsibilities
for data management
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Skilledfield is Gold Sponsor for DAMA Australia
Our sponsorship in the Data Architecture and Data Security areas demonstrates our
commitment to the data community and our support for best practices. Our engineers
leverage the Data Management Body of Knowledge (DMBoK) to apply information and
data management best practices to enhance the business value of your Big Data.
13
The Data
Management
Association
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Unleash Big Data Technologies to Solve Complex CyberSecurity Problems
Uplift Security Detection and Response Capability
14
● Stop malware at the host, while enabling centralized visibility and advanced threat detection.
● Perform threat-modeling to understand the organization's defensive capabilities and develop customised detections
whilst tuning out false alerts to target genuine vulnerabilities.
● Collect, transform and store data from a broad set of systems including custom ones, build a strong track record of
transparency to inspect security measures and increase visibility.
● Implement fast, scalable, and relevant threat intelligence and data enrichment.
● Leverage machine learning to combat zero-day attacks.
● Organise SOC tasks and playbooks for automated analysis and response.
● Right size your solution including hosting, data throughput, licencing and operational resources.
Respond
Analyse
Detect
85% 30%
50%
of MSPs reported
attacks against SMBs
over the last two years.
of malware attacks
are zero-day exploits.
of security alerts are
false positives leading
to SOCs increasing
staff.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Protect your Organisation!
15
“It takes 20 years to build a reputation
and a few minutes of cyber-incident to
ruin it”
STEPHANE NAPPO
Global Head of Information Security for Société Générale International Banking & Financial Services
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
“A more secure
online world for
Australians, their
businesses and the
essential services
upon which we all
depend.”
Australia’s Cyber Security Strategy 2020
16
https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
● Invest $1.67 billion over 10 years
● New ways to investigate and shut
down cyber crime, including on the
dark web.
● Advice for small and medium
enterprises to increase their cyber
resilience.
● Clear guidance for businesses and
consumers about securing Internet of
Things devices.
● Improved community awareness of
cyber security threats.
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
Thank you!
info@skilledfield.com.au
17
https://skilledfield.com.au/
https://www.linkedin.com/company/skilled-field/
This Session is being recorded and will be posted on Skilledfield’s Youtube Channel

More Related Content

PDF
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
PPTX
PDF
Sharpening risktechs cutting edge
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PPTX
IoT - Data Management Trends, Best Practices, & Use Cases
PPTX
HPE Security Keynote from Istanbul 20th Jan 2016
PDF
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
PPTX
Transform Banking with Big Data and Automated Machine Learning 9.12.17
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
Sharpening risktechs cutting edge
Virtual Gov Day - Security Breakout - Deloitte
IoT - Data Management Trends, Best Practices, & Use Cases
HPE Security Keynote from Istanbul 20th Jan 2016
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Transform Banking with Big Data and Automated Machine Learning 9.12.17

What's hot (20)

PDF
Cloud computing for banking
PPTX
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
PPTX
Digital Transformation (Implications for the CXO)
PDF
Future of Big Data
PPTX
Infrastructure Matters
PPTX
The Big Picture: Real-time Data is Defining Intelligent Offers
PDF
MT81 Keys to Successful Enterprise IoT Initiatives
PPTX
Digital alpha technologies inc
PPT
PCSG Corporate Overview
PPTX
Into the Big Data Future with Watson Analytics
PDF
strategies-align-OT-IT-whitepaper-1
PPTX
Big Data & Analytics Day
PPTX
Solving Your Top IT Challenges
PDF
The Impacts of COVID-19 on Enterprise IT
PDF
MBT Webinar: Does the security of your business data keep you up at night?
PPTX
Machine learning in Banks
PDF
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
PDF
Adapting for the Internet of Things
PDF
Virtual Reality in Financial Services (A Primer)
PDF
Meetup7 integration microservices_machine_learning
Cloud computing for banking
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
Digital Transformation (Implications for the CXO)
Future of Big Data
Infrastructure Matters
The Big Picture: Real-time Data is Defining Intelligent Offers
MT81 Keys to Successful Enterprise IoT Initiatives
Digital alpha technologies inc
PCSG Corporate Overview
Into the Big Data Future with Watson Analytics
strategies-align-OT-IT-whitepaper-1
Big Data & Analytics Day
Solving Your Top IT Challenges
The Impacts of COVID-19 on Enterprise IT
MBT Webinar: Does the security of your business data keep you up at night?
Machine learning in Banks
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Adapting for the Internet of Things
Virtual Reality in Financial Services (A Primer)
Meetup7 integration microservices_machine_learning
Ad

Similar to Big data for cybersecurity - skilledfield slides - 25032021 (20)

PDF
Big Data & Security Have Collided - What Are You Going to do About It?
 
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Data Science for Cyber Risk
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PPTX
Security Analytics Beyond Cyber
PDF
Karim Baina Assises AUSIM 2016
PPTX
Advanced threat protection and big data
PDF
The Role Of Data Analytics In Cybersecurity
PDF
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
PPT
Abney and Associates Security 2014 News: Big Returns from Big Data for Security
PDF
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
PPTX
How to tackle big data from a security
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PPTX
Inside SecOps at bet365
PPTX
Big data security the perfect storm
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
PDF
The value of big data analytics
PPTX
Risk Product Management - Creating Safe Digital Experiences, Product School 2019
Big Data & Security Have Collided - What Are You Going to do About It?
 
Big Data Analytics for Cyber Security: A Quick Overview
Data Science for Cyber Risk
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
Security Analytics Beyond Cyber
Karim Baina Assises AUSIM 2016
Advanced threat protection and big data
The Role Of Data Analytics In Cybersecurity
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
Abney and Associates Security 2014 News: Big Returns from Big Data for Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
How to tackle big data from a security
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Inside SecOps at bet365
Big data security the perfect storm
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
The value of big data analytics
Risk Product Management - Creating Safe Digital Experiences, Product School 2019
Ad

Recently uploaded (20)

PPTX
Modelling in Business Intelligence , information system
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
Leprosy and NLEP programme community medicine
PDF
Microsoft Core Cloud Services powerpoint
PPTX
Database Infoormation System (DBIS).pptx
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPT
Predictive modeling basics in data cleaning process
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPT
DATA COLLECTION METHODS-ppt for nursing research
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
SAP 2 completion done . PRESENTATION.pptx
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PDF
Lecture1 pattern recognition............
PDF
How to run a consulting project- client discovery
PPTX
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Modelling in Business Intelligence , information system
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Leprosy and NLEP programme community medicine
Microsoft Core Cloud Services powerpoint
Database Infoormation System (DBIS).pptx
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Predictive modeling basics in data cleaning process
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
DATA COLLECTION METHODS-ppt for nursing research
Data_Analytics_and_PowerBI_Presentation.pptx
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Optimise Shopper Experiences with a Strong Data Estate.pdf
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
SAP 2 completion done . PRESENTATION.pptx
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
Lecture1 pattern recognition............
How to run a consulting project- client discovery
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx

Big data for cybersecurity - skilledfield slides - 25032021

  • 1. Big Data for Cybersecurity Mouaz Alnouri 25 March 2021 This Session will be recorded and posted on Skilledfield’s Youtube Channel
  • 2. About me I’m Mouaz Alnouri, the Managing Director of Skilledfield. We help clients unleash the power of big data technology to detect cyber security events and utilise automation to efficiently alert, escalate and respond to security threats. Technologist with years of experience in solving complex business problems through creative client-centric strategies and value-driven solutions. A change agent, capable of orchestrating a transformative business strategy through data-driven decisions. 2 Mouaz leads the Skilledfield team with an unrivalled passion for data and a zest for problem solving. With over a decade in the IT services industry, he’s provided intelligent solutions for complex problems throughout his career. He’s worked with major technology and telecommunications firms including Telstra and NBN Co. Limited, where he’s delivered data focused solutions that have significantly improved operational efficiency. He’s a customer-focused problem solver that leads the Skilledfield team towards their vision to become Australia’s leading Big Data solutions provider. https://www.linkedin.com/in/malnouri/ This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 3. What we are covering today ➔ One Slides about Skilledfield ➔ Why Cybersecurity is a Big Data use case ➔ How do we address Cybersecurity as Big Data Professionals ➔ How do we keep up with the emerging cyber threats ➔ Benefits of Big Data Technology for Cybersecurity 3 This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 4. About Skilledfield: A Field of Skilled professionals! 4 Uplift Security Detection and Response Capability Uplift Observability Capability BI to AI Analytics Services ● Centralised Security Event logging and auditing ● Endpoint Protection ● SOAR ● Advanced Security Analytics ● Managed Services ● Centralised Operational event monitoring and alerting ● AIOps, (Artificial Intelligence for IT operations) ● Managed Services ● Big Data Analytics using Elastic ● Big Data Analytics using Databricks ● Big Data Analytics using Microsoft Azure Services Solving Complex Problems with Simplified Solutions This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 5. Cybersecurity is Big Data Use Case 5 Volume High amount of data generated In terabytes Velocity Generated in real-time in streams, batch or bits Variety Structured, Unstructured, Semi structured Big Data Use Case Protect R e s p o n s e & R e c o v e r I d e n t i f y & D e t e c t Assessment This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 6. Detection Data Engineering Pipeline 6 Acquire Parse Enrich Analyse Alert Sources Tune This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 7. Design Data Analytics Solution ● Comprehend business value chain ● Understand short-term and long-term goals and identify key business questions ● Define analytics use cases ● Perform an initial assessment of data sources ● Design a solution 7 This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 8. Threat Modelling - PASTA (Risk Based) 8 Define Objectives Define Technical Scope Application Decomposition Threat Analysis Vulnerability & Weakness Analysis Attack Modelling Risk & Impact Analysis The Process for Attack Simulation and Threat Analysis https://resources.sei.cmu.edu/asset_files/WhitePaper/2018_019_001_524597.pdf Potential Threat: Identified, categorized, analysed, prioritise response This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 9. Most Concerning Types of Cyber Threats 9 According to IT security decision makers worldwide as of November 2019. Source: https://www.statista.com/statistics/500946/worldwide-leading-it-security-threats/ Malware is the most concerning cyberthreat targeting organizations. Phishing and ransomware were jointly ranked second. Over the last two years, the number of insider incidents has increased by 47%. 30 percent of malware attacks are zero day exploits Advanced attackers uniquely compile the code they bring with them to specifically not match anything they’ve used elsewhere or ever will again This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 10. Behavioural Analytics 10 Acquire Parse Enrich Analyse Alert Sources Tune Learn Detect This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 11. Same data. Different questions. 11 Ingest & prepare Alerting and Machine learning Detect, hunt, investigate Ecosystem of network and host data connectors used to orchestrate your data feed from edge devices. Processing the data in real-time and analysing it to identify threats and detecting abnormal behaviours. Ad hoc queries at scale and interactive threat hunting allows a rapid event triage and investigation. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 12. The DAMA Wheel 12 To use consistent words and relations which leads to more alignment with current and future requirements Data lifecycle, data integrity, data availability and data usage performance Access control, confidentiality and regulatory compliance Data Consolidation and Data Movement Endure effective and efficient storage, retrieval and use of data Provide authoritative source of reconciled and quality-assessed data Technical environment and Technical and Business Processes Provide organisational understanding of business terms and usages Identify Data storage and processing requirements Standards, requirements and specifications for data Principles, policies, procedures, metrics, tools and responsibilities for data management This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 13. Skilledfield is Gold Sponsor for DAMA Australia Our sponsorship in the Data Architecture and Data Security areas demonstrates our commitment to the data community and our support for best practices. Our engineers leverage the Data Management Body of Knowledge (DMBoK) to apply information and data management best practices to enhance the business value of your Big Data. 13 The Data Management Association This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 14. Unleash Big Data Technologies to Solve Complex CyberSecurity Problems Uplift Security Detection and Response Capability 14 ● Stop malware at the host, while enabling centralized visibility and advanced threat detection. ● Perform threat-modeling to understand the organization's defensive capabilities and develop customised detections whilst tuning out false alerts to target genuine vulnerabilities. ● Collect, transform and store data from a broad set of systems including custom ones, build a strong track record of transparency to inspect security measures and increase visibility. ● Implement fast, scalable, and relevant threat intelligence and data enrichment. ● Leverage machine learning to combat zero-day attacks. ● Organise SOC tasks and playbooks for automated analysis and response. ● Right size your solution including hosting, data throughput, licencing and operational resources. Respond Analyse Detect 85% 30% 50% of MSPs reported attacks against SMBs over the last two years. of malware attacks are zero-day exploits. of security alerts are false positives leading to SOCs increasing staff. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 15. Protect your Organisation! 15 “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it” STEPHANE NAPPO Global Head of Information Security for Société Générale International Banking & Financial Services This Session is being recorded and will be posted on Skilledfield’s Youtube Channel
  • 16. “A more secure online world for Australians, their businesses and the essential services upon which we all depend.” Australia’s Cyber Security Strategy 2020 16 https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf ● Invest $1.67 billion over 10 years ● New ways to investigate and shut down cyber crime, including on the dark web. ● Advice for small and medium enterprises to increase their cyber resilience. ● Clear guidance for businesses and consumers about securing Internet of Things devices. ● Improved community awareness of cyber security threats. This Session is being recorded and will be posted on Skilledfield’s Youtube Channel