{"id":246,"date":"2013-06-05T00:00:00","date_gmt":"2013-06-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/05\/rsas-art-coviello-points-to-big-data-approach-to-combat-cyber-security-challenges\/"},"modified":"2021-12-30T11:36:50","modified_gmt":"2021-12-30T11:36:50","slug":"rsas-art-coviello-points-to-big-data-approach-to-combat-cyber-security-challenges","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/05\/rsas-art-coviello-points-to-big-data-approach-to-combat-cyber-security-challenges\/","title":{"rendered":"RSA\u2019s Art Coviello points to Big Data approach to combat cyber security challenges"},"content":{"rendered":"<p>Leveraging Big Data approaches to security can help make the much-needed intelligence-driven security model \u2013 comprised of pervasive monitoring and threat intelligence sharing \u2013 a reality for organizations that face growing and sophisticated cyber-attacks. In his opening keynote at RSA Conference Asia Pacific 2013, Art Coviello, Executive Vice President of EMC Corporation and Executive Chairman of RSA, The Security Division of EMC, outlined how leveraging Big Data approaches to security can help make the much-needed intelligence-driven security model a reality for organizations in the face of growing and sophisticated cyber-attacks. While addressing the crowd at RSA Conference Asia-Pacific held in Singapore, Coviello explained that within many organizations, a lack of understanding and knowledge and unbalanced security budgets are current impediments to the adoption of an intelligence-driven security model.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An intelligence-driven security model, on the other hand, leverages Big Data analytics for pervasive monitoring, threat information sharing and intelligent controls and is designed to allow for more rapid detection of attacks and shortening an attacker\u2019s dwell time within a breached enterprise. He said, \u201cThe ongoing expansion of the attack surface and the escalation in the threat environment require urgent action, there must be a sense of urgency to understand the security implications in everything we do so that we develop and implement the right security model.\u201d<\/p>\n<p style=\"margin: 0px; min-height: 14px;\">Create a transformational security strategy \u2013 Practitioners must look critically at their budgets and design a plan that transitions the existing infrastructure to an intelligence-driven approach that incorporate Big Data capabilities.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">He went on to explain government\u2019s key role of acting as a central repository to exchange pertinent security information about current threats and attacks as well as to set the tone for cooperation internationally.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The security vendors were called upon to help close the technology and skills gap for defending against attacks that has been created as a result of the growing attack surface and the escalating threat environment.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">In closing he offered that these approaches can help enable the industry to manage cyber security risk to acceptable levels so that all societies around the world can reap the benefits and meet the goal of a more trusted digital world.<\/p>\n<p>\nLink: <a href=\"http:\/\/www.informationweek.in\/security\/13-06-05\/rsa_s_art_coviello_points_to_big_data_approach_to_combat_cyber_security_challenges.aspx\">http:\/\/www.informationweek.in\/security\/13-06-05\/rsa_s_art_coviello_points_to_big_data_approach_to_combat_cyber_security_challenges.aspx<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-246","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/246\/revisions"}],"predecessor-version":[{"id":2733,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/246\/revisions\/2733"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}