SlideShare a Scribd company logo
© 2014 IBM Corporation 
Four key steps to security and privacy for big data
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
2 
Change increases data management challenges 
Consumerization of IT 
Data is… 
Generated 24x7 
Used everywhere 
Always accessible 
On private devices 
Data Explosion 
Data is… 
Leaving the data center 
Stored on shared drives 
Hosted by 3rd parties 
Managed by 3rd parties 
Data is… 
Produced in high volumes 
Stored in diverse formats 
Analyzed faster/cheaper 
Monetized 
Mobile 
New data platforms offer tremendous opportunities for enterprises, but they are also a honey pot for attackers.
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
3 
Threats to data come from a variety of sources 
42% 
external, malicious attacks 
30% 
human errors 
29% 
system/IT glitches 
Where do data breaches originate? 
Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute LLC, May 2014
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
4 
Data breaches have a significant financial impact 
of companies said a 
data breach caused moderate 
to severe impact on the 
business 
2/3 of customers would 
leave you if you mistreated 
their data 
average cost 
of a data breach 
$184M - $330M brand value lost by each victim of a data breach 
2/3 76% $3.5M 
Source: Reputation Impact of a Data Breach, Ponemon Institute LLC, Oct 2011
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
5 
Data security is becoming a greater executive concern 
Increasingly, companies are appointing CISOs, CROs and CDOs* with direct lines to the Audit Committee 
Loss of market share and reputation 
Legal exposure 
Audit failure 
Fines and criminal charges 
Financial loss 
Loss of data confidentiality, integrity and/or availability 
Violation of employee privacy 
Loss of customer trust 
Loss of brand reputation 
CEO 
CFO/COO 
CIO 
CHRO 
CMO 
*Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series 
* Chief Information Security Officer 
Chief Risk Officer 
Chief Data Officer 
C-level officers have varied concerns about data security and privacy.
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
6 
To protect data, address these key questions 
Where is the sensitive data? 
How can sensitive data be protected? 
What is actually happening? 
How can we prevent unauthorized activities be prevented? 
Discovery 
Classification 
Identity & Access Management 
Activity 
Monitoring 
Blocking 
Quarantine 
Masking/ Encryption 
Assessment 
Compliance Reporting & Security Alerts 
Data Protection & Enforcement 
Security Policies 
Access Entitlements 
1. Discover 
2. Harden 
3. Monitor 
4. Protect
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
7 
Build a holistic data security and privacy strategy 
Big data and traditional environments 
Data at Rest 
Configuration 
Data in Motion 
Discovery 
Classification 
Masking 
Encryption 
Vulnerability Assessment 
Entitlements Reporting 
Activity 
Monitoring 
Dynamic Data Masking 
1. Discover 
2. Harden 
3. Monitor 
4. Protect 
Blocking 
Quarantine 
A holistic data security and privacy strategy will: a. prevent data breaches b. ensure data integrity c. reduce cost of compliance d. protect privacy
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
8 
Four steps to holistic data security and privacy 
Find & 
Classify 
Secure & 
Monitor 
Harden 
Protect & 
Remain Vigilant 
 Continuously assess 
database 
vulnerabilities 
 Monitor authorized 
access entitlements 
 Centralize reporting 
 Define sensitive 
data 
 Discover and 
classify sensitive 
data 
 Collaborate 
between business 
& IT 
 Real-time alerts on 
configuration changes 
 Preconfigured policies 
and reports 
 Built-in compliance 
workflow 
 Automated security 
policies 
 Enforce change 
control 
 Mask sensitive data 
 Prevent cyber 
attacks 
 Encrypt data at rest 
Best practices based approach aligns people, processes and technology to 
create a cohesive, coordinated approach to data security 
1 
2 
3 
4
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
9 
Explore further 
Four steps to a 
proactive big data 
security and privacy 
strategy 
Comprehensive data 
protection for 
physical, virtual and 
cloud 
infrastructures 
Download these 
free eBooks and 
get started with 
your data security 
and privacy journey
© 2014 IBM Corporation 
Addressing Modern Data Security and Privacy Concerns 
10 
ACT 
with Confidence

More Related Content

PDF
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
PPTX
The REAL Impact of Big Data on Privacy
PPTX
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
PDF
Big Data & Privacy
PPTX
Big data security the perfect storm
PDF
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
PPT
Information security in big data -privacy and data mining
PPT
Big Data Ecosystem for Data-Driven Decision Making
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
The REAL Impact of Big Data on Privacy
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data & Privacy
Big data security the perfect storm
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Information security in big data -privacy and data mining
Big Data Ecosystem for Data-Driven Decision Making

What's hot (20)

PPTX
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
PDF
Expanded top ten_big_data_security_and_privacy_challenges
PDF
Big Data and High Performance Computing
PDF
Privacy and Big Data Overload!
PPTX
data mining privacy concerns ppt presentation
PPTX
Privacy by design for peerlyst meetup
PDF
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
PPTX
Privacy by Design - taking in account the state of the art
PPTX
Privacy by design
PPTX
Privacy by design for startups: legal and technology
PDF
Privacy and Security by Design
PPTX
Towards Privacy by Design. Key issues to unlock science.
PPTX
Privacy by Design as a system design strategy - EIC 2019
PDF
Privacy by Design and by Default + General Data Protection Regulation with Si...
PPTX
Privacy by Design: White Papaer
PPTX
ISACA Houston - How to de-classify data and rethink transfer of data between ...
PPTX
What I learned at the Infosecurity ISACA North America Conference 2019
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PPT
Enlightened Privacy – by Design for a Smarter Grid
PPT
Privacy by Design Seminar - Jan 22, 2015
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Expanded top ten_big_data_security_and_privacy_challenges
Big Data and High Performance Computing
Privacy and Big Data Overload!
data mining privacy concerns ppt presentation
Privacy by design for peerlyst meetup
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Privacy by Design - taking in account the state of the art
Privacy by design
Privacy by design for startups: legal and technology
Privacy and Security by Design
Towards Privacy by Design. Key issues to unlock science.
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design: White Papaer
ISACA Houston - How to de-classify data and rethink transfer of data between ...
What I learned at the Infosecurity ISACA North America Conference 2019
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Enlightened Privacy – by Design for a Smarter Grid
Privacy by Design Seminar - Jan 22, 2015
Ad

Viewers also liked (20)

PPTX
Information Security in Big Data : Privacy and Data Mining
PDF
Global bigdata conf_01282013
PDF
走出IT人才荒 研討會
PPT
Data Privacy & Security Update 2012
PPT
Privacy, Permissions and the Evolution of Big Data
PDF
Privacy preserving detection of sensitive data exposure
PPTX
The Impact of Cloud: Cloud Computing Security and Privacy
PPTX
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
PDF
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
PPTX
PPTX
Big Data and Security - Where are we now? (2015)
PPTX
Paper presentation held at national seminar
PPTX
Big data security
PPTX
Conference Powerpoint Presentations
PDF
The Security and Privacy Threats to Cloud Computing
PPTX
Review Paper – Power Point Presentation
PPT
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
PPTX
IEEE Presentation
PPT
Ppt for national conference
PPTX
Time Of Courage
Information Security in Big Data : Privacy and Data Mining
Global bigdata conf_01282013
走出IT人才荒 研討會
Data Privacy & Security Update 2012
Privacy, Permissions and the Evolution of Big Data
Privacy preserving detection of sensitive data exposure
The Impact of Cloud: Cloud Computing Security and Privacy
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Big Data and Security - Where are we now? (2015)
Paper presentation held at national seminar
Big data security
Conference Powerpoint Presentations
The Security and Privacy Threats to Cloud Computing
Review Paper – Power Point Presentation
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
IEEE Presentation
Ppt for national conference
Time Of Courage
Ad

Similar to IBM's four key steps to security and privacy for big data (20)

PDF
Data security in a big data environment sweden
PDF
Bridging the Data Security Gap
PDF
A Cybersecurity Planning Guide for CFOs
PPT
Data security in the cloud
PPTX
David valovcin big data - big risk
PDF
Bridging the Gap Between Your Security Defenses and Critical Data
PPTX
Secure Systems of Engagement
PPTX
Security in it
PDF
Small Business Administration Recommendations
PDF
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
PDF
Rethinking Data Protection Strategies 1st Edition by Aberdeen group
PDF
Rethinking Data Protection Strategies 1st Edition by Aberdeen group
PDF
Rethinking Data Protection Strategies 1st Edition by Aberdeen group
PDF
Case study financial_services
PPTX
Information security
PPTX
Cyber Security_Training Presentation.pptx
PDF
Ensuring Data Protection Compliance.docx.pdf
PDF
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
PDF
CS Sakerhetsdagen 2015 IBM Feb 19
PDF
Fortify Your Business with Data Security Services: Protect Your Assets with M...
Data security in a big data environment sweden
Bridging the Data Security Gap
A Cybersecurity Planning Guide for CFOs
Data security in the cloud
David valovcin big data - big risk
Bridging the Gap Between Your Security Defenses and Critical Data
Secure Systems of Engagement
Security in it
Small Business Administration Recommendations
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
Rethinking Data Protection Strategies 1st Edition by Aberdeen group
Rethinking Data Protection Strategies 1st Edition by Aberdeen group
Rethinking Data Protection Strategies 1st Edition by Aberdeen group
Case study financial_services
Information security
Cyber Security_Training Presentation.pptx
Ensuring Data Protection Compliance.docx.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CS Sakerhetsdagen 2015 IBM Feb 19
Fortify Your Business with Data Security Services: Protect Your Assets with M...

More from IBM Analytics (20)

PDF
Data Lake: A simple introduction
PDF
10 WealthTech podcasts every wealth advisor should listen to
PDF
Advantages of an integrated governance, risk and compliance environment
PDF
Cognitive banking with expert insights
PDF
Sales performance management and C-level goals
PDF
The science of client insight: Increase revenue through improved engagement
PDF
Expert opinion on managing data breaches
PDF
Top industry use cases for streaming analytics
PPTX
Make data simple in the cognitive era
PPTX
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
PDF
4 common headaches with sales compensation management
PDF
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
PPTX
Data science tips for data engineers
PDF
How secure is your enterprise from threats?
PDF
10 benefits to thinking inside Box
PDF
The digital transformation of the French Open
PDF
Bridging to a hybrid cloud data services architecture
PDF
What does data tell you about the customer journey?
PDF
What CEOs want from CDOs and how to deliver on it
PDF
Banking in the age of the empowered consumer
Data Lake: A simple introduction
10 WealthTech podcasts every wealth advisor should listen to
Advantages of an integrated governance, risk and compliance environment
Cognitive banking with expert insights
Sales performance management and C-level goals
The science of client insight: Increase revenue through improved engagement
Expert opinion on managing data breaches
Top industry use cases for streaming analytics
Make data simple in the cognitive era
IBM CDO Fall Summit 2016 Keynote: Driving innovation in the cognitive era
4 common headaches with sales compensation management
IBM Virtual Finance Forum 2016: Top 10 reasons to attend
Data science tips for data engineers
How secure is your enterprise from threats?
10 benefits to thinking inside Box
The digital transformation of the French Open
Bridging to a hybrid cloud data services architecture
What does data tell you about the customer journey?
What CEOs want from CDOs and how to deliver on it
Banking in the age of the empowered consumer

Recently uploaded (20)

PDF
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
PPT
DU, AIS, Big Data and Data Analytics.ppt
PPTX
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
PDF
Business Analytics and business intelligence.pdf
PDF
[EN] Industrial Machine Downtime Prediction
PDF
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PPTX
IMPACT OF LANDSLIDE.....................
PDF
Introduction to Data Science and Data Analysis
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
DOCX
Factor Analysis Word Document Presentation
PPTX
Leprosy and NLEP programme community medicine
PDF
Microsoft Core Cloud Services powerpoint
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
SAP 2 completion done . PRESENTATION.pptx
PDF
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
DU, AIS, Big Data and Data Analytics.ppt
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
Business Analytics and business intelligence.pdf
[EN] Industrial Machine Downtime Prediction
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
Qualitative Qantitative and Mixed Methods.pptx
STERILIZATION AND DISINFECTION-1.ppthhhbx
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
IMPACT OF LANDSLIDE.....................
Introduction to Data Science and Data Analysis
IBA_Chapter_11_Slides_Final_Accessible.pptx
Factor Analysis Word Document Presentation
Leprosy and NLEP programme community medicine
Microsoft Core Cloud Services powerpoint
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Optimise Shopper Experiences with a Strong Data Estate.pdf
SAP 2 completion done . PRESENTATION.pptx
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...

IBM's four key steps to security and privacy for big data

  • 1. © 2014 IBM Corporation Four key steps to security and privacy for big data
  • 2. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 2 Change increases data management challenges Consumerization of IT Data is… Generated 24x7 Used everywhere Always accessible On private devices Data Explosion Data is… Leaving the data center Stored on shared drives Hosted by 3rd parties Managed by 3rd parties Data is… Produced in high volumes Stored in diverse formats Analyzed faster/cheaper Monetized Mobile New data platforms offer tremendous opportunities for enterprises, but they are also a honey pot for attackers.
  • 3. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 3 Threats to data come from a variety of sources 42% external, malicious attacks 30% human errors 29% system/IT glitches Where do data breaches originate? Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute LLC, May 2014
  • 4. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 4 Data breaches have a significant financial impact of companies said a data breach caused moderate to severe impact on the business 2/3 of customers would leave you if you mistreated their data average cost of a data breach $184M - $330M brand value lost by each victim of a data breach 2/3 76% $3.5M Source: Reputation Impact of a Data Breach, Ponemon Institute LLC, Oct 2011
  • 5. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 5 Data security is becoming a greater executive concern Increasingly, companies are appointing CISOs, CROs and CDOs* with direct lines to the Audit Committee Loss of market share and reputation Legal exposure Audit failure Fines and criminal charges Financial loss Loss of data confidentiality, integrity and/or availability Violation of employee privacy Loss of customer trust Loss of brand reputation CEO CFO/COO CIO CHRO CMO *Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series * Chief Information Security Officer Chief Risk Officer Chief Data Officer C-level officers have varied concerns about data security and privacy.
  • 6. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 6 To protect data, address these key questions Where is the sensitive data? How can sensitive data be protected? What is actually happening? How can we prevent unauthorized activities be prevented? Discovery Classification Identity & Access Management Activity Monitoring Blocking Quarantine Masking/ Encryption Assessment Compliance Reporting & Security Alerts Data Protection & Enforcement Security Policies Access Entitlements 1. Discover 2. Harden 3. Monitor 4. Protect
  • 7. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 7 Build a holistic data security and privacy strategy Big data and traditional environments Data at Rest Configuration Data in Motion Discovery Classification Masking Encryption Vulnerability Assessment Entitlements Reporting Activity Monitoring Dynamic Data Masking 1. Discover 2. Harden 3. Monitor 4. Protect Blocking Quarantine A holistic data security and privacy strategy will: a. prevent data breaches b. ensure data integrity c. reduce cost of compliance d. protect privacy
  • 8. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 8 Four steps to holistic data security and privacy Find & Classify Secure & Monitor Harden Protect & Remain Vigilant  Continuously assess database vulnerabilities  Monitor authorized access entitlements  Centralize reporting  Define sensitive data  Discover and classify sensitive data  Collaborate between business & IT  Real-time alerts on configuration changes  Preconfigured policies and reports  Built-in compliance workflow  Automated security policies  Enforce change control  Mask sensitive data  Prevent cyber attacks  Encrypt data at rest Best practices based approach aligns people, processes and technology to create a cohesive, coordinated approach to data security 1 2 3 4
  • 9. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 9 Explore further Four steps to a proactive big data security and privacy strategy Comprehensive data protection for physical, virtual and cloud infrastructures Download these free eBooks and get started with your data security and privacy journey
  • 10. © 2014 IBM Corporation Addressing Modern Data Security and Privacy Concerns 10 ACT with Confidence