Insights

Big Data Analytics: Is it the Future of IT Security?

J.S. Held Strengthens Forensic Accounting and Financial Investigations Expertise and Expands Suite of Services in Canada with Acquisition of ADS Forensics

Read More close Created with Sketch.
Home·Insights·Articles

If an organization is not using analytics tools to support its IT Security Risk Management efforts, what is it using instead? Big data analytics tools will be crucial to enterprise security as criminals deploy faster and more sophisticated methods to steal valuable data, according to security firm RSA.

“We are really at the beginning of intelligence-driven security. It is just the tip of the iceberg. Looking forward, we are going to have to be smarter [to deal with threats] and we are going to be looking at better data science,” said RSA’s head of knowledge delivery and business development, Daniel Cohen. “It’s not ‘if’ we are going to be breached, but ‘when’ we are going to be breached, so there is a need to focus more on detection. We saw with the Target breach it was the human factor that slipped there, so we have to be able to bring in more automation.”

The number of successful attacks against high-profile businesses has increased in recent years, with the compromise of Target’s point-of-sale systems being just one example of the variety of methods that cybercriminals are using to steal data on a large scale.

Businesses are threatened by many sources--from criminal groups to "hacktivists" and insider threats, as evidenced, recently, by the theft of payroll data for thousands of employees at Morrisons (UK) and, more famously, Edward Snowden at the NSA.

Businesses Have Been Slow to Adopt Data Analytics

However, the adoption of big data analytics within businesses for security--and the maturity of offerings from vendors--remains in the early stages. While banks are already deploying analytics for fraud prevention purposes and have begun engaging with big data start-ups for security services, there are few businesses that have adopted new techniques and tools to monitor threats.

A recent Gartner study highlighted that the adoption of big data analytics currently stands at only 8% of large enterprises, though this is set to grow to 25% by 2016 as businesses catch up with the information being generated across their business.

Read the full story on computerworlduk.com.

Acknowledgments

We would like to thank Kevin Gorsline for providing insight and expertise that greatly assisted this research.

Kevin Gorsline is a Managing Director in J.S. Held's Global Investigations Practice who joined following J.S. Held's acquisition of TBG Security. For several years, Kevin served as the Chief Operating Officer and head of the Risk and Compliance practice at TBG Security, where he was responsible for providing the leadership, management, and vision necessary to ensure that the company had the proper operational controls, administrative and reporting procedures, and people systems in place to effectively grow the organization and to ensure financial strength and operating efficiency. His experience and leadership throughout his career have been focused on developing and delivering information security services and solutions, providing outstanding client service, and driving profitable revenue growth. Kevin brings established proficiency as an IT leader with extensive experience in risk and compliance services, applications development, and implementation projects both in the United States and abroad.

Kevin can be reached at [email protected] or +1 843 890 8596.

Find your expert.

This publication is for educational and general information purposes only. It may contain errors and is provided as is. It is not intended as specific advice, legal, or otherwise. Opinions and views are not necessarily those of J.S. Held or its affiliates and it should not be presumed that J.S. Held subscribes to any particular method, interpretation, or analysis merely because it appears in this publication. We disclaim any representation and/or warranty regarding the accuracy, timeliness, quality, or applicability of any of the contents. You should not act, or fail to act, in reliance on this publication and we disclaim all liability in respect to such actions or failure to act. We assume no responsibility for information contained in this publication and disclaim all liability and damages in respect to such information. This publication is not a substitute for competent legal advice. The content herein may be updated or otherwise modified without notice.

You May Also Be Interested In
Perspectives

Strategies to Avoid Cyber Insurance Claim Challenges: Part II

In Part II of addressing cyber claims challenges, we identify gaps in coverage and quick fixes for a smoother claims process....

Perspectives

Benefits of a Virtual Chief Information Security Officer (vCISO) in the Age of AI-Driven Cyberattacks

A Virtual Chief Information Security Officer (vCISO) can be a cost-effective solution to AI cyberattacks....

Perspectives

Cybercrime vs. Cybersecurity: Learning the Tactics of Criminals to Protect Your Interests

To safeguard our digital lives, both the "inside out" security approach and the “outside in” prevention approach are needed....

 
INDUSTRY INSIGHTS
Keep up with the latest research and announcements from our team.
Our Experts