Big Data - The Holy Grail for Information Security?
- LANGUAGE: English DATE: Thursday, December 19, 2013 TIME: 5:00pm CET, 11:00am EST, 8:00am PST
With an increasing number of fraud incidents, customer data losses and other breaches on one side, and the disappearance of the classical perimeter because of the need to finally extend the enterprise to partners and customers on the other side, introducing Big Data for Security Analytics seems to be the logical next level for your information security strategy. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will talk about the benefits and challenges using Big Data for security analytics, and he will draw your attention to the additional risk that may come along with Big Data Tools.
Big Data for security analysis, properly implemented, has the potential to put your organization well ahead of attackers and spies. However, there are a number of challenges you have to carefully consider before deciding, because otherwise you might just add new and unknown vulnerabilities outweighting a possible gain.
Some of the questions discussed in this webinar are:
- Having huge amounts of security data - all in one place: How can you make sure that you really gain more visibility?
- Who is the person/who are the persons who actually write queries and dig into the Big Data and where do you find those skills?
- Many Big Data Tools in the market are freshly baked, themselves insecure, unstable and hard to implement: How do I find the tool that fits my needs and what are the implementation challenges and costs?
- How to you ensure that you really find the needle in the haystack?
- How to ensure that you do not end up with too many false negatives - or false positives?
Continuing Education Credits
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: firstname.lastname@example.org
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.