SlideShare a Scribd company logo
Real Life Examples of
Graph Cybersecurity
Gal Bello
Field Engineer, Neo4j
Agenda
❏ Hello!
❏ Cyber Security
❏ The Problem, Solution
❏ Numbers
❏ Graph Data Model for CS
❏ Real Life Example
❏ Q&A
❏ Goodbye!
2
01
Gal Bello
Neo4j Field Engineer, Israel
@gal_bello
Linkedin.com/in/galbello/
3
What’s the thing you like most about Neo4j?
“Neo4j is not just only one of the most innovative companies around the globe, it also leads a
positive cultural approach to its employees, customers, partners and community members:
Diversity & inclusion, open minded, acceptance & positiveness assumption.”
Cybersecurity
Cybersecurity
“Cybersecurity is the practice of defending
computers, servers, mobile devices,
electronic systems, networks, and data from
malicious attacks.”
What is Cybersecurity?
Cyber
Security
Cyber
Security
01
Around is
expected to be spent
on CS by 2021
$6T
01
Every seconds
there is a hacker attack
39
01
of malware is
delivered using email
92%
01
of
Cyber attacks target
Enterprise companies
57%
01
experienced
phishing & social
engineering attacks
62%
What is the Problem?
Cybersecurity analysts have to capture,
store, analyze and potentially share vast
amounts of rapidly evolving information.
The Problem:
Cybersecurity analysts have to capture,
store, analyze and potentially share vast
amounts of rapidly evolving information.
The Problem:
Cybersecurity analysts have to capture,
store, analyze and potentially share vast
amounts of rapidly evolving information.
The Problem:
Cybersecurity analysts have to capture,
store, analyze and potentially share vast
amounts of rapidly evolving information.
The Problem:
Cybersecurity analysts have to capture,
store, analyze and potentially share vast
amounts of rapidly evolving information.
The Problem:
Graph Database could assist them secure
their data, by leveraging connections in data.
The Solution:
Graph Database could assist them secure
their data, by leveraging connections in data.
The Solution:
Graph Data Modeling
Examples
Law
Enforcement
Use Case:
Information and Data
Synchronization in
Law Enforcement
Law Enforcement Agencies use
Neo4j to model the information
into graphs to improve efficiency
and make direct and implicit
patterns readily apparent in real
time.
A suspect often appears in several
different databases
Financial records
Convictions
Adresses
Vehicles
Traffic cameras
Arrests
Police Reports
Appears_in
Has
H
a
s
H
a
s
Owns Registered
SUSPECT
Has
01
ACCOUNT
HOLDER 2
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
ADDRESS
PHONE
NUMBER
PHONE
NUMBER
SSN 2
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
Banking
Use Case:
Modeling Fraud
Rings as Graphs
Organizing a fraud ring in the real
world is relatively simple. A group of
people share their personal
information to create synthetic
identities. For example with just 2
individuals sharing names and social
security numbers can create 4
different identities. This can be
discovered with connected analysis.
01
01
Government
• Better Services
• More Consistency
• Saves Time
• Coordinates Efforts
MARRIED_TO
L
I
V
E
S
_
A
T
LIVES_AT
FATHER_OF
ENROLLED_IN
OWNS
OWNS
ID#
PHONE
EMAIL
H
A
S
HAS
HAS
MOTHER_OF
ID#
PHONE
EMAIL
Building a Real Life
Graph Data Model
01
Employee A
Employee B
Employee C
Employee D
Employee Z
DEPARTMENT 100
01
Employee A
Employee B
Employee C
Employee D
Employee Z
DEPARTMENT 100
BANK
ACCOUNT ADDRESS
01
Employee A
Employee B
Employee C
Employee D
Employee Z
DEPARTMENT 100
BANK
ACCOUNT ADDRESS
PROJECT A PROJECT B
PROJECT C
DEPARTMENT 200 DEPARTMENT 300
01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account Address
Project C
Documents
Documents
01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account Address
Project C
Documents
Documents
PRODUCTION
SERVERS
01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account
Address
Project C
Documents
Documents
PRODUCTION
SERVERS
:PUBLISHED_ON
:SAVED_ON
:WORKS_AT
:MANAGES
Cybersecurity
01
Employee A
Employee B
Employee C
Employee D
Employee Z
Department 100
Bank
Account
Address
Project C
Documents
Documents
PRODUCTION
SERVERS
:PUBLISHED_ON
:SAVED_ON
:WORKS_AT
:MANAGES
PHISHING
EMAILS
Hacker
01
Employee Z
HACKER
PROJECT A
DEPARTMENT 22
BANK
ACCOUNT
ADDRESS
DOCUMENTS
PRODUCTION
SERVERS
Cybersecurity
PHISHING
EMAIL
PHISHING
EMAIL
PUBLISHED ON
Employee A
Employee B
Employee C
DEPARTMENT 4
PROJECT B PROJECT C
Recommendations
❏ Try It: Neo4j.com/download/
❏ Learn It: Neo4j.com/graphacademy/
❏ Join Us: neo4j-users.slack.com
❏ Contact Us: Neo4j.com/contact-us/
ENJOY IT!
33
 Real Life Examples of Cybersecurity with Neo4j
Thank you!
Gal Bello
Field Engineer, Neo4j

More Related Content

PDF
Social engineering
PDF
End-User Security Awareness
PDF
What is Social Engineering? An illustrated presentation.
PDF
Data Privacy & Security
PPTX
Cybersecurity Awareness Overview.pptx
PPTX
Hacker Hunters Case Study
PPTX
What is Cyber Security - Avantika University
Social engineering
End-User Security Awareness
What is Social Engineering? An illustrated presentation.
Data Privacy & Security
Cybersecurity Awareness Overview.pptx
Hacker Hunters Case Study
What is Cyber Security - Avantika University

What's hot (20)

PPTX
Data breach presentation
PPTX
Data breach
PPT
Ethics in IT Security
PDF
IT Security & Governance Template
PPTX
Social engineering hacking attack
PPTX
Basic Security Training for End Users
PPTX
Iot Security, Internet of Things
PPTX
Cybersecurity
PPTX
Data Security - English
PDF
Cyber threat intelligence ppt
PDF
Information Security Awareness for everyone
PDF
Security in Cyber-Physical Systems
PPTX
Cybercrime a growing threat of 21 st century !!!
PDF
Cyber Security Awareness
PDF
Prevención Lavado Activos Financiamiento Terrorismo.pdf
PPTX
Hyphenet Security Awareness Training
PDF
Fundamentals of IoT Security
PPTX
skillcast-gdpr-training-presentation-q320.pptx
PPTX
Social Engineering
Data breach presentation
Data breach
Ethics in IT Security
IT Security & Governance Template
Social engineering hacking attack
Basic Security Training for End Users
Iot Security, Internet of Things
Cybersecurity
Data Security - English
Cyber threat intelligence ppt
Information Security Awareness for everyone
Security in Cyber-Physical Systems
Cybercrime a growing threat of 21 st century !!!
Cyber Security Awareness
Prevención Lavado Activos Financiamiento Terrorismo.pdf
Hyphenet Security Awareness Training
Fundamentals of IoT Security
skillcast-gdpr-training-presentation-q320.pptx
Social Engineering
Ad

Similar to Real Life Examples of Cybersecurity with Neo4j (20)

PDF
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
PDF
Graphs in Government
PDF
Graphs in Government, Jim Webber
PDF
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
PDF
Neo4j graphs in government
PPTX
Your Enemies Use GenAI Too! Staying Ahead of Fraud with Neo4j Knowledge Graph...
PDF
9 Trends in Identity Verification (2023) by Regula
DOCX
What Happens to Your Data When a Company Gets Breached
PDF
1. The Importance of Graphs in Government
PDF
The significance of the 7 Colors of Information Security
PDF
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
PPTX
Ketnote: GraphTour Boston
PPTX
Cloud & Sécurité
PPTX
11 19-2015 - iasaca membership conference - the state of security
PDF
CYREN_2015_CyberThreat_Yearbook
PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
PDF
Government GraphSummit: Keynote - Graphs in Government
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Graphs in Government
Graphs in Government, Jim Webber
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j graphs in government
Your Enemies Use GenAI Too! Staying Ahead of Fraud with Neo4j Knowledge Graph...
9 Trends in Identity Verification (2023) by Regula
What Happens to Your Data When a Company Gets Breached
1. The Importance of Graphs in Government
The significance of the 7 Colors of Information Security
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
Ketnote: GraphTour Boston
Cloud & Sécurité
11 19-2015 - iasaca membership conference - the state of security
CYREN_2015_CyberThreat_Yearbook
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Government GraphSummit: Keynote - Graphs in Government
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Ad

More from Neo4j (20)

PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
PDF
Jin Foo - Prospa GraphSummit Sydney Presentation.pdf
PDF
GraphSummit Singapore Master Deck - May 20, 2025
PPTX
Graphs & GraphRAG - Essential Ingredients for GenAI
PPTX
Neo4j Knowledge for Customer Experience.pptx
PPTX
GraphTalk New Zealand - The Art of The Possible.pptx
PDF
Neo4j: The Art of the Possible with Graph
PDF
Smarter Knowledge Graphs For Public Sector
PDF
GraphRAG and Knowledge Graphs Exploring AI's Future
PDF
Matinée GenAI & GraphRAG Paris - Décembre 24
PDF
ANZ Presentation: GraphSummit Melbourne 2024
PDF
Google Cloud Presentation GraphSummit Melbourne 2024: Building Generative AI ...
PDF
Telstra Presentation GraphSummit Melbourne: Optimising Business Outcomes with...
PDF
Hands-On GraphRAG Workshop: GraphSummit Melbourne 2024
PDF
Démonstration Digital Twin Building Wire Management
PDF
Swiss Life - Les graphes au service de la détection de fraude dans le domaine...
PDF
Démonstration Supply Chain - GraphTalk Paris
PDF
The Art of Possible - GraphTalk Paris Opening Session
PPTX
How Siemens bolstered supply chain resilience with graph-powered AI insights ...
PDF
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Jin Foo - Prospa GraphSummit Sydney Presentation.pdf
GraphSummit Singapore Master Deck - May 20, 2025
Graphs & GraphRAG - Essential Ingredients for GenAI
Neo4j Knowledge for Customer Experience.pptx
GraphTalk New Zealand - The Art of The Possible.pptx
Neo4j: The Art of the Possible with Graph
Smarter Knowledge Graphs For Public Sector
GraphRAG and Knowledge Graphs Exploring AI's Future
Matinée GenAI & GraphRAG Paris - Décembre 24
ANZ Presentation: GraphSummit Melbourne 2024
Google Cloud Presentation GraphSummit Melbourne 2024: Building Generative AI ...
Telstra Presentation GraphSummit Melbourne: Optimising Business Outcomes with...
Hands-On GraphRAG Workshop: GraphSummit Melbourne 2024
Démonstration Digital Twin Building Wire Management
Swiss Life - Les graphes au service de la détection de fraude dans le domaine...
Démonstration Supply Chain - GraphTalk Paris
The Art of Possible - GraphTalk Paris Opening Session
How Siemens bolstered supply chain resilience with graph-powered AI insights ...
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
KodekX | Application Modernization Development
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
sap open course for s4hana steps from ECC to s4
Digital-Transformation-Roadmap-for-Companies.pptx
KodekX | Application Modernization Development
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Agricultural_Statistics_at_a_Glance_2022_0.pdf
cuic standard and advanced reporting.pdf

Real Life Examples of Cybersecurity with Neo4j