Главная
Study mode:
on
1
Intro
2
@daviottenheimer
3
"Predictive Analysis Tool" Rear View Mirror
4
Racecar Competitive Advantages • 1911 Rear-view mirror • 1911 Aerodynamics
5
Seatbelt Timeline to Adoption
6
Big Data Seatbelts?
7
Threat Modeling
8
Emperor's New Controls
9
Control Opportunities
10
Big Data Control Areas
11
A Simple "How To" Framework 1. Net and System Security 4. Access Control
12
Progress to consider
13
Example: Authentication
14
Realities of Securing Big Data
15
Phase Two - Availability
16
Phase Three - Classification
17
Phase Four - Authority
18
Phase Five - Least Authority
19
The Snow Den Lesson CHOLERA VORONI
20
Systematic Treatment = Resilience
Description:
Explore the critical challenges and solutions for securing Big Data environments in this Black Hat conference talk. Delve into the risks associated with rapid adoption of Big Data technologies like Hadoop, often implemented without adequate security considerations. Learn how to measure and manage data with precision while addressing emerging vulnerabilities and threats. Examine why "learning" machines sometimes make amusing or tragic mistakes, and discover strategies for infosec professionals to proactively engage with Big Data security. Gain insights from the book "Realities of Big Data Security" as the speaker guides you through the most challenging areas of big data protection and presents effective solutions for these elephantine challenges. Cover topics including threat modeling, control opportunities, authentication, availability, classification, authority, and least authority principles. Understand the importance of systematic treatment for resilience in Big Data security, drawing lessons from historical examples and contemporary cases like the Snowden revelations. Read more

Babar-ians at the Gate - Data Protection at Massive Scale

Black Hat
Add to list