Creat membership Creat membership
Sign in

Forgot password?

Confirm
  • Forgot password?
    Sign Up
  • Confirm
    Sign In
Creat membership Creat membership
Sign in

Forgot password?

Confirm
  • Forgot password?
    Sign Up
  • Confirm
    Sign In
Collection
For ¥0.57 per day, unlimited downloads CREATE MEMBERSHIP Download

toTop

If you have any feedback, Please follow the official account to submit feedback.

Turn on your phone and scan

home > search >

Preemptive Security Through Information Analytics

Author:
Early, Gregory   Stott III, William  


Journal:
Information Security Journal: A Global Perspective


Issue Date:
2015


Abstract(summary):

Business security and threat actors continue to play a dangerous cat-and-mouse game with businesses intellectual property, customer data, and business reputations at stake. Businesses need to delve into a new way of doing business security to break out of this game. Businesses are sitting on repositories full of security-relevant data that is not being capitalized upon with the current information security and physical security organizations within businesses. This article poses the introduction of a data scientist role and a new supporting central data correlation technology platform based on big data predictive analytics into business security functions. The goal is to intelligently and autonomously identify, correlate and pinpoint normally innocuous or unnoticed security event attributes to allow security personnel to preemptively remediate physical and information risks before exploitation or loss of intellectual property occurs. Gregory Early M.S., CISSP, CISSP-ISSAP, is an information security architect in the defense industry. He has nearly 20 years of experience in information assurance, SOC and NOC operations, systems architecture, project management, and strategic alignments of people-process-technology in information technology. He has worked with small to large corporations with U.S. domestic and international footprints with a constant passion to reduce operational risk. William Stott III, B.S., CISSP, GXPN, GREM, CCNP, is a principle security engineer in the defense industry. He has more than 18 years of experience in information security operations, network architecture, penetration testing, intrusion prevention, incident response, and code analysis. He has enhanced the security posture of production environments across a diverse set of corporations with domestic and international operations.


Page:
48-56


VIEW PDF

The preview is over

If you wish to continue, please create your membership or download this.

Create Membership

Similar Literature

Submit Feedback

This function is a member function, members do not limit the number of downloads