We’ve seen Information Security departments mature to respond to technical infrastructure threats, but can we bring a data-centric approach to identifying security incidents? In this session, you’ll learn what Big Data techniques can do for you in identifying potential security incidents, using business transaction data and security information. Whether you’re just setting up a new Security Incident and Event Management (SIEM) process or have been running a Security Operations Center for years, this session will show you the power of using data analytics for information security.
- Couple business data with information security data to identify anomalies
- Correlating anomalies can create a repeatable monitoring process
- Security incidents use more than one weakness to exploit you
About Steve Currie
Steve Currie is a senior manager in the cybersecurity practice of Ernst & Young (EY) LLP. With over 15 years of experience at EY, he has led engagements at clients ranging from Fortune 25 companies to local private firms. He is a global leader in EY’s Cyber Program Management (CPM) competency, specifically collaborating with clients to develop solutions to address current challenges, such as supply chain security for connected products.
About Matt Hynes
Matt Hynes is a Partner/Principal in the Advisory Services practice of Ernst & Young (EY) LLP. He leads EY’s Cyber Program Management (CPM) services focused on information security strategy, governance and security function transformation. He is a frequent speaker on related topics at industry events and serves as a guest lecturer at the University of Minnesota’s Carlson School of Business. Hynes is the past president of the Minnesota Chapter of the Information Systems Audit & Control Association (ISACA) and is involved in numerous professional associations.