Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
September 2013

Big Data: Controlling the Perfect Storm

Recorded Live: September 24, 2013
Start Time: 9:00 a.m. US Pacific/ 12:00 p.m. US Eastern/ 5:00 p.m. London

Click here for presentation slides.
Click here to view the recorded web conference.

Generously supported by:

Web Conference Overview:

The primary drivers for applications of Big Data are continually decreasing cost of storage, rapid increases in connectivity (e.g., global internet, hand held and mobile devices, the cloud, etc.), expanding availability of sensors, and the rising sophistication of data analysis tools. Add to this the mind boggling amounts of available data of all kinds, which is growing exponentially from 1.8 zettabytes in 2011 according to IDC's Digital Universe Study, and you have the perfect storm for new ways to manage information security.

Cloud-based monitoring comes with event logs that need never run out of storage or processing capacity. New modeling and analysis tools can sift through and reduce huge amounts of data into dashboard feeds that provide management with current, relevant information that documents the organization's security posture and provides near real time assurance of security policy conformance.


Chris Diehl
Principal and Co-Founder, The Data Guild

Chris Diehl is a principal and co-founder of The Data Guild, a mission-driven consultancy aiming to address the toughest societal challenges through enhanced sensemaking and system optimization.

Prior to co-founding the Data Guild, he was the principal data scientist at Jive Software where he focused on designing and developing advanced analytics for enterprise social search and online community health assessment. Before joining Jive, Chris spent over ten years as a senior research scientist at the Johns Hopkins University Applied Physics Laboratory and Lawrence Livermore National Laboratory. There he defined and developed machine learning approaches to address a variety of inference challenges across the Department of Defense and the intelligence community.

He is broadly interested in human-machine systems to enhance community resilience in an uncertain world. He holds a Ph.D. in Electrical and Computer Engineering from Carnegie Mellon University.

Kathy Zeidenstein
Technology Evangelist, IBM InfoSphere Guardium

Kathy Zeidenstein is a technology evangelist for IBM InfoSphere Guardium data protection solutions, based out of the Silicon Valley Lab. She is responsible for producing content to build skills and raise awareness for Guardium technologies.

She has written several how-to articles and given several presentations on using InfoSphere Guardium database activity monitoring solutions for Hadoop and MongoDB. Previously, she was an Information Development Manager for InfoSphere Optim data lifecycle tools. Previously, she has held roles in technical enablement, product management and product marketing within the Information Management and Enterprise Content Management organizations at IBM.

Matthew Mosley - Northern Virginia, USA Chapter
ISSA Web Conference Committee, Session Moderator

Matt Mosley has been working as a security professional for more than 20 years in roles within corporate IT and risk management, strategic consulting, and product development. In his current role with ThreatTrack Security, Matt leads product management activities for a portfolio of malware protection solutions.

Prior to this role, Matt held senior leadership roles with leading security firms including NetIQ, Internet Security Systems, Intellitactics and Brabeion Software. Matt is an active member of security industry groups including ISACA and ISSA, and sits on the ISSA Web Conference Committee. Matt holds the CISSP, CISM, and CISA designations, teaches CISSP courses for ISSA-NOVA, and is a frequent speaker at security conferences.

Community Search
Sign In

Forgot your password?

Haven't registered yet?


ISSA International Conference Preview: Computer Science Curricula’s Failure

ISSA Web Conference: How to Recruit and Retain Cyber-Security Professionals

Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

11/2/2016 » 11/3/2016
2016 ISSA International Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information