SlideShare a Scribd company logo
© 2014 IBM Corporation 
Four key steps to security and privacy for big data
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
2 
Change increases data management challenges 
Consumerization of IT 
Data is… 
Generated 24x7 
Used everywhere 
Always accessible 
On private devices 
Data Explosion 
Data is… 
Leaving the data center 
Stored on shared drives 
Hosted by 3rd parties 
Managed by 3rd parties 
Data is… 
Produced in high volumes 
Stored in diverse formats 
Analyzed faster/cheaper 
Monetized 
Mobile 
New data platforms offer tremendous opportunities for enterprises, but they are also a honey pot for attackers.
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
3 
Threats to data come from a variety of sources 
42% 
external, malicious attacks 
30% 
human errors 
29% 
system/IT glitches 
Where do data breaches originate? 
Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute LLC, May 2014
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
4 
Data breaches have a significant financial impact 
of companies said a 
data breach caused moderate 
to severe impact on the 
business 
2/3 of customers would 
leave you if you mistreated 
their data 
average cost 
of a data breach 
$184M - $330M brand value lost by each victim of a data breach 
2/3 76% $3.5M 
Source: Reputation Impact of a Data Breach, Ponemon Institute LLC, Oct 2011
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
5 
Data security is becoming a greater executive concern 
Increasingly, companies are appointing CISOs, CROs and CDOs* with direct lines to the Audit Committee 
Loss of market share and reputation 
Legal exposure 
Audit failure 
Fines and criminal charges 
Financial loss 
Loss of data confidentiality, integrity and/or availability 
Violation of employee privacy 
Loss of customer trust 
Loss of brand reputation 
CEO 
CFO/COO 
CIO 
CHRO 
CMO 
*Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series 
* Chief Information Security Officer 
Chief Risk Officer 
Chief Data Officer 
C-level officers have varied concerns about data security and privacy.
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
6 
To protect data, address these key questions 
Where is the sensitive data? 
How can sensitive data be protected? 
What is actually happening? 
How can we prevent unauthorized activities be prevented? 
Discovery 
Classification 
Identity & Access Management 
Activity 
Monitoring 
Blocking 
Quarantine 
Masking/ Encryption 
Assessment 
Compliance Reporting & Security Alerts 
Data Protection & Enforcement 
Security Policies 
Access Entitlements 
1. Discover 
2. Harden 
3. Monitor 
4. Protect
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
7 
Build a holistic data security and privacy strategy 
Big data and traditional environments 
Data at Rest 
Configuration 
Data in Motion 
Discovery 
Classification 
Masking 
Encryption 
Vulnerability Assessment 
Entitlements Reporting 
Activity 
Monitoring 
Dynamic Data Masking 
1. Discover 
2. Harden 
3. Monitor 
4. Protect 
Blocking 
Quarantine 
A holistic data security and privacy strategy will: a. prevent data breaches b. ensure data integrity c. reduce cost of compliance d. protect privacy
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
8 
Four steps to holistic data security and privacy 
Find & 
Classify 
Secure & 
Monitor 
Harden 
Protect & 
Remain Vigilant 
 Continuously assess 
database 
vulnerabilities 
 Monitor authorized 
access entitlements 
 Centralize reporting 
 Define sensitive 
data 
 Discover and 
classify sensitive 
data 
 Collaborate 
between business 
& IT 
 Real-time alerts on 
configuration changes 
 Preconfigured policies 
and reports 
 Built-in compliance 
workflow 
 Automated security 
policies 
 Enforce change 
control 
 Mask sensitive data 
 Prevent cyber 
attacks 
 Encrypt data at rest 
Best practices based approach aligns people, processes and technology to 
create a cohesive, coordinated approach to data security 
1 
2 
3 
4
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
9 
Explore further 
Four steps to a 
proactive big data 
security and privacy 
strategy 
Comprehensive data 
protection for 
physical, virtual and 
cloud 
infrastructures 
Download these 
free eBooks and 
get started with 
your data security 
and privacy journey
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
10 
ACT 
with Confidence

More Related Content

PPT
Information Technology Policy for Corporates - Need of the Hour
PPT
It Policies
PPTX
Example presentation
DOCX
Running head technology vulnerabilities in the cloud
PPT
COBIT and IT Policy Presentation
PPT
PPTX
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
PPT
Isms awareness training
Information Technology Policy for Corporates - Need of the Hour
It Policies
Example presentation
Running head technology vulnerabilities in the cloud
COBIT and IT Policy Presentation
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Isms awareness training

What's hot (19)

PPTX
Reasons why accountants should switch to cloud computing
PPTX
ISO 27001 - information security user awareness training presentation -part 2
PDF
Cybersecurity Skills in Industry 4.0
PPTX
Top 2016 Mobile Security Threats and your Employees
PPTX
Structure of iso 27001
PPTX
Information security
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Data erasure's role in limiting cyber attacks
PPT
Information Security Management.Introduction
PPTX
Cybersecurity in the Era of IoT
PPT
Information security.pptx
PPTX
gkkSecurity essentials domain 1
PDF
Whitepaper: Security in the Network Environment
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PPTX
Seclore FileSecure HotFolder Walkthrough
PPTX
Secuntialesse
DOCX
ISO 27001 Training | ISMS Awareness Training
PDF
The importance of information security
PPSX
Best Practices For Information Security Management 2011
Reasons why accountants should switch to cloud computing
ISO 27001 - information security user awareness training presentation -part 2
Cybersecurity Skills in Industry 4.0
Top 2016 Mobile Security Threats and your Employees
Structure of iso 27001
Information security
Cybersecurity 1. intro to cybersecurity
Data erasure's role in limiting cyber attacks
Information Security Management.Introduction
Cybersecurity in the Era of IoT
Information security.pptx
gkkSecurity essentials domain 1
Whitepaper: Security in the Network Environment
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Seclore FileSecure HotFolder Walkthrough
Secuntialesse
ISO 27001 Training | ISMS Awareness Training
The importance of information security
Best Practices For Information Security Management 2011
Ad

Viewers also liked (9)

KEY
Brainient deck for institute marketing
PDF
Building a Distributed Build System at Google Scale
PDF
Webinar: Customer Growth and Loyalty with the Marketing Cloud
PPTX
Benefits of Modular Gasification (Waste to Energy)
PPTX
Brainient interactive video
PPTX
The Big Data Ecosystem for Financial Services
PDF
Technology, creativity & data: How to tell your story, engage your audience a...
PDF
6 Presentation Styles of Famous Presenters
PPT
Types of presentations
Brainient deck for institute marketing
Building a Distributed Build System at Google Scale
Webinar: Customer Growth and Loyalty with the Marketing Cloud
Benefits of Modular Gasification (Waste to Energy)
Brainient interactive video
The Big Data Ecosystem for Financial Services
Technology, creativity & data: How to tell your story, engage your audience a...
6 Presentation Styles of Famous Presenters
Types of presentations
Ad

Similar to Big data contains valuable information - Protect It! (20)

PDF
Data security in a big data environment sweden
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PPTX
Compete To Win: Don’t Just Be Compliant – Be Secure!
PPT
Data security in the cloud
PDF
Bridging the Data Security Gap
PPTX
David valovcin big data - big risk
PDF
Bridging the Gap Between Your Security Defenses and Critical Data
PDF
Threat Ready Data: Protect Data from the Inside and the Outside
PDF
White Paper: The Age of Data
PDF
Encrypt-Everything-eB.pdf
PDF
Winning the war on data breaches in a changing data landscape
PDF
Data Breaches: The Untold Story
PDF
Guardium Data Activiy Monitor For C- Level Executives
PPTX
Data Modeling for Security, Privacy and Data Protection
PDF
Isaca global journal - choosing the most appropriate data security solution ...
PPTX
Data Privacy | Data Management Frameworks - Tejasvi Addagada
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PDF
Five_Big_Data_Security_Pitfalls
PPTX
U1 - Data Privacy and Compliance Requirements.pptx
PDF
The value of big data analytics
Data security in a big data environment sweden
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Compete To Win: Don’t Just Be Compliant – Be Secure!
Data security in the cloud
Bridging the Data Security Gap
David valovcin big data - big risk
Bridging the Gap Between Your Security Defenses and Critical Data
Threat Ready Data: Protect Data from the Inside and the Outside
White Paper: The Age of Data
Encrypt-Everything-eB.pdf
Winning the war on data breaches in a changing data landscape
Data Breaches: The Untold Story
Guardium Data Activiy Monitor For C- Level Executives
Data Modeling for Security, Privacy and Data Protection
Isaca global journal - choosing the most appropriate data security solution ...
Data Privacy | Data Management Frameworks - Tejasvi Addagada
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Five_Big_Data_Security_Pitfalls
U1 - Data Privacy and Compliance Requirements.pptx
The value of big data analytics

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced IT Governance
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Network Security Unit 5.pdf for BCA BBA.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced IT Governance
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
GamePlan Trading System Review: Professional Trader's Honest Take
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Empathic Computing: Creating Shared Understanding
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...

Big data contains valuable information - Protect It!

  • 1. © 2014 IBM Corporation Four key steps to security and privacy for big data
  • 2. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 2 Change increases data management challenges Consumerization of IT Data is… Generated 24x7 Used everywhere Always accessible On private devices Data Explosion Data is… Leaving the data center Stored on shared drives Hosted by 3rd parties Managed by 3rd parties Data is… Produced in high volumes Stored in diverse formats Analyzed faster/cheaper Monetized Mobile New data platforms offer tremendous opportunities for enterprises, but they are also a honey pot for attackers.
  • 3. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 3 Threats to data come from a variety of sources 42% external, malicious attacks 30% human errors 29% system/IT glitches Where do data breaches originate? Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute LLC, May 2014
  • 4. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 4 Data breaches have a significant financial impact of companies said a data breach caused moderate to severe impact on the business 2/3 of customers would leave you if you mistreated their data average cost of a data breach $184M - $330M brand value lost by each victim of a data breach 2/3 76% $3.5M Source: Reputation Impact of a Data Breach, Ponemon Institute LLC, Oct 2011
  • 5. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 5 Data security is becoming a greater executive concern Increasingly, companies are appointing CISOs, CROs and CDOs* with direct lines to the Audit Committee Loss of market share and reputation Legal exposure Audit failure Fines and criminal charges Financial loss Loss of data confidentiality, integrity and/or availability Violation of employee privacy Loss of customer trust Loss of brand reputation CEO CFO/COO CIO CHRO CMO *Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series * Chief Information Security Officer Chief Risk Officer Chief Data Officer C-level officers have varied concerns about data security and privacy.
  • 6. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 6 To protect data, address these key questions Where is the sensitive data? How can sensitive data be protected? What is actually happening? How can we prevent unauthorized activities be prevented? Discovery Classification Identity & Access Management Activity Monitoring Blocking Quarantine Masking/ Encryption Assessment Compliance Reporting & Security Alerts Data Protection & Enforcement Security Policies Access Entitlements 1. Discover 2. Harden 3. Monitor 4. Protect
  • 7. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 7 Build a holistic data security and privacy strategy Big data and traditional environments Data at Rest Configuration Data in Motion Discovery Classification Masking Encryption Vulnerability Assessment Entitlements Reporting Activity Monitoring Dynamic Data Masking 1. Discover 2. Harden 3. Monitor 4. Protect Blocking Quarantine A holistic data security and privacy strategy will: a. prevent data breaches b. ensure data integrity c. reduce cost of compliance d. protect privacy
  • 8. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 8 Four steps to holistic data security and privacy Find & Classify Secure & Monitor Harden Protect & Remain Vigilant  Continuously assess database vulnerabilities  Monitor authorized access entitlements  Centralize reporting  Define sensitive data  Discover and classify sensitive data  Collaborate between business & IT  Real-time alerts on configuration changes  Preconfigured policies and reports  Built-in compliance workflow  Automated security policies  Enforce change control  Mask sensitive data  Prevent cyber attacks  Encrypt data at rest Best practices based approach aligns people, processes and technology to create a cohesive, coordinated approach to data security 1 2 3 4
  • 9. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 9 Explore further Four steps to a proactive big data security and privacy strategy Comprehensive data protection for physical, virtual and cloud infrastructures Download these free eBooks and get started with your data security and privacy journey
  • 10. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 10 ACT with Confidence