The 七 of Big Data: Finding Whiro

Presented at Kiwicon 7: Cyberfriends (2013), Nov. 10, 2013, 10 a.m. (45 minutes)

We know many different types of data are generated and captured at high speed but what do we know about weaknesses introduced? Security still is widely misunderstood and discussed haltingly with regard to Big Data. This presentation brings forward the giant Hadoopy elephant in the room and offers the audience some real-world puzzles to solve. Examples are presented of humorous failures as well as successes. You might think your security problems are a pain until you are asked tohelp find Whiro in the 七 of Big Data.

Presenters:

  • Davi Ottenheimer
    Over 18 years managing global security operations and assessments, including a decade of leading incident response and digital forensics. Co-author of the book "Securing the Virtual Environment: How to Defend the Enterprise Against Attack". Currently Senior Dir of Trust for EMC. Formerly responsible for security at Barclays Global Investors (BGI) the world's largest investment fund manager. Prior to BGI a "dedicated paranoid" at Yahoo! managing security for hundreds of millions of mobile, broadband and digital home products.

Links:

Similar Presentations: