Cyber Security Institute

§ Current Worries

Top 3 Worries

  • Regulations
  • Old Firewall Configurations
  • Security Awareness

§ Listening

For the best information

  • The underground
  • Audible
  • Executive Excellence
  • Music (to keep me sane)

§ Watching

For early warnings

  • 150 Security Websites
  • AP Newsfeeds
  • Vendors

Wednesday, June 05, 2013

RSA’s Art Coviello points to Big Data approach to combat cyber security challenges

Leveraging Big Data approaches to security can help make the much-needed intelligence-driven security model – comprised of pervasive monitoring and threat intelligence sharing – a reality for organizations that face growing and sophisticated cyber-attacks. In his opening keynote at RSA Conference Asia Pacific 2013, Art Coviello, Executive Vice President of EMC Corporation and Executive Chairman of RSA, The Security Division of EMC, outlined how leveraging Big Data approaches to security can help make the much-needed intelligence-driven security model a reality for organizations in the face of growing and sophisticated cyber-attacks. While addressing the crowd at RSA Conference Asia-Pacific held in Singapore, Coviello explained that within many organizations, a lack of understanding and knowledge and unbalanced security budgets are current impediments to the adoption of an intelligence-driven security model.

An intelligence-driven security model, on the other hand, leverages Big Data analytics for pervasive monitoring, threat information sharing and intelligent controls and is designed to allow for more rapid detection of attacks and shortening an attacker’s dwell time within a breached enterprise. He said, “The ongoing expansion of the attack surface and the escalation in the threat environment require urgent action, there must be a sense of urgency to understand the security implications in everything we do so that we develop and implement the right security model.”

Create a transformational security strategy – Practitioners must look critically at their budgets and design a plan that transitions the existing infrastructure to an intelligence-driven approach that incorporate Big Data capabilities.

He went on to explain government’s key role of acting as a central repository to exchange pertinent security information about current threats and attacks as well as to set the tone for cooperation internationally.

The security vendors were called upon to help close the technology and skills gap for defending against attacks that has been created as a result of the growing attack surface and the escalating threat environment.

In closing he offered that these approaches can help enable the industry to manage cyber security risk to acceptable levels so that all societies around the world can reap the benefits and meet the goal of a more trusted digital world.


Posted on 06/05