APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Big Data
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Big Data
    Editor's Pick (1 - 4 of 8)
    left
    How Have Recent Advancements in Big Data Been Impacting Businesses?

    Marc Solomon, CIO, Bvn Architecture

    When Science Fiction Becomes Science Fact: An Industry Embracing Monumental Change

    Stephen Barnham, Senior Vice President & Chief Information Officer, Metlife Asia

    The Inherent Necessity of Big Data as a Strategic Factor

    Esteban Remecz, CIO, Asia Pacific, ZF Group

    Big Data and Credit Scoring in Indonesia

    Darmawan Zaini, Chief Technology & Product Officer, UangTeman

    Experience on Data Analytics

    Kee Siang Lee,

    Building a Smart City by Better Connected World

    Barry Lerner, South Pacific Regional CIO, Huawei Technologies

    Survival of the Fittest in a Data-Driven World: The Secret is in your Software

    Jason Jackson, Field CTO and Director, Advanced Field Engineering, Pivotal APAC

    Big Data Initiatives need Innovative Thinking to Make Things Happen

    Kah Chai Tan, Group CIO, Sime Darby Berhad

    right

    Big Data Analytics in Cyber Security

    Vahid Behbood, Chief Data Scientist, BT Security

    Tweet
    content-image

    Vahid Behbood, Chief Data Scientist, BT Security

    Introduction

    The current cyber security ecosystem is vastly different from how it was a couple of decades ago. Nowadays companies enjoy more sophisticated, diverse and versatile digital environments which comprise of technologies such as cloud computation, software as a service, IoT devices, automated robots, etc. Although these new technologies increase efficiency and provide significant value for companies, the accompanying increase in the complexity of the digital environment provides a fertile landscape for adversarial activities. Organisations operating in these environments are therefore faced with the challenging task of maintaining an efficient and holistic security practice, while realising the benefits of these new technologies.

    Modern advancements in computational science could provide the solution. Organisations can now efficiently digest and analyse huge volumes of data from a multitude of sources such as desktop computers, servers, mobile phones, applications and IoT devices. Effective use of this data could provide the key to tackling the sophisticated and ever-changing cyber threat landscape. Unlike conventional static signature(rule)-based security solutions, big data analytics enables security teams to build data-driven and dynamic solutions that learn to recognise malicious activity patterns. These solutions can then increase the efficacy of the protection, detection, investigation and response stages of the security monitoring process.

    Protection

    Protection is the first security layer of organisation where big data analytics plays acritical role. The protection layer includes security devices and solutions such as firewall, web proxy, IAM, CASB,EDR, IDPS, and DLP that aim to protect organisations against cyber threat. These devices conventionally rely on static signatures and configuration provided by experts and threat intelligence in confronting known threats and malware. However, the current threat landscape is so advanced and dynamic that these security devices can struggle to protect an organisation’s vital assets efficiently.

    One effective solution is to learn and recognise complex threat patterns, while handling the high velocities and varieties of network traffic that pass through a modern organisation’s digital environment.. Big data plays an essential role in both identifying malicious behaviours and providing a framework to handle network data. An analytics solution built upon massive data from various sources can be embedded into security solutions on the protection layer as a complementary capability to signature-based methods.

    Detection

    Since cyber threats are immense in their number and diversity, it would be naïve to think that the protection security layer guarantees the organisation immunity against adversarial events. Hence, it is realistic to assume that the organisation has already been or will be compromised, and that some form of malware may exist in its digital environment. Therefore, the detection layer becomes crucial. Solutions like security information and event management (SIEM), user and entity behaviour analytics (UEBA) and network traffic analytics (NTA) focus on detecting malicious events and activities that are present and active in a digital environment.

    Considering the high number of devices and entities that normally operate in a modern organisation and, more importantly, the massive amount of data that they produce in the form of log events, it is apparent that big data is hugely helpful in this scenario. The data volume is in the order of terabytes per day, originating from many sources generating millions of events per second. Finding the malicious events in this digital environment is analogous to finding a needle in haystack, which makes the big data platform and framework invaluable for generating actionable insights into malicious behaviour patterns.

    Investigation

    Another layer of security for an organisation is the investigation layer which is sometimes referred to as threat hunting. In the investigation stage, security experts dig into data lakes of past events produced by digital entities to explore and find historical malicious events and incidents. In typical practice, the analyst performs retrospective investigation spanning from 6 months’ worth of data up to a couple of years. Considering that timeline, a cyber analyst could deal with unimaginable amount of data, and it would be near impossible to carry out an investigation without acknowledgement of the big data ecosystem and architecture.

    The investigative analytics on this massive amount of data span from basic descriptive analytics to advanced analytics like Artificial Intelligence. Descriptive analytics can include simply understanding general behaviour of traffic – such as the amount of web traffic during the normal business hours and the geographical destination of web connections. Advanced analytics such as Deep Learning leverage massive amounts of data to mine the historical data and explore interesting patterns of adversaries that have been unnoticed and undetected by cyber experts(e.g. due to the novelty and complexity of attack or just simply too much data to be monitored). These advanced analytics are a great example of human experts being augmented by big data, rather than being replaced.

    Response

    The last security layer, but definitely not the least, is the response layer. It focuses on triage, analysis and response to detected malicious events and incidents. The response layer is the most critical, intensive and resource-consuming stage o the security monitoring process. It requires numerous cyber experts with different levels of security expertise to examine every single alert supplied by multiple security tools within an organisation. For example, Security Operation Centres (SOCs) monitoring environments for large, frequently-targeted organisations such as banks could receive in the order of thousands of alerts per day. These events need to be analysed by cyber analysts to find malicious incidents and respond as quickly as possible in order to contain and/or remediate damage done by the threat.

    The Response layer is the most resource intensive part of security monitoring process and it also represents the key performance indicator for cyber security departments. Therefore, many companies are attracted by the idea of introducing smart automation, which should be able to learn and adapt the response process when receiving different types of alerts. This allows it to act promptly and with minimum human intervention when action needs to be taken.

    To be smart and adaptive, it requires access to the big data environment that contains the historical data of case incidents including alerts and responses. Utilising this data, smart automation forms robust learning of the relation between alerts and the relevant response actions. Smart automation unlocks the potential of security experts by reducing the time spent on menial tasks and increasing the time spent on advanced tasks. Moreover, it considerably reduces the time to detection and response and improves the productivity of security departments.

    Cyber Security Platform

    Big data technology has successfully been imbedded into analytics products for various business sectors such as finance, retail, health and telecom. Its now also plating a crucial role in today’s cyber security industry, due to the volume, velocity and variety of the data in this domain. In fact, it’s now almost impossible to unravel the actual view of security information without using big data technologies and frameworks in the core of security architecture. Big data analytics empower companies to offer holistic, accurate and efficient security monitoring mechanism and continually maintain the standard security posture.BT is pioneering in this space with its Cyber Security Platform; combining big data engineering and advanced analytics. Leveraging huge volumes of data and innovative analytics capabilities is actively helping to protect BT as well as our partners and customers, from today's advanced threat landscape.

    tag

    Big Data

    IoT

    Firewall

    Cyber Threats

    Weekly Brief

    loading
    Top 10 Big Data Solutions Companies – 2023
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://bigdata.apacciooutlook.com/cxoinsights/big-data-analytics-in-cyber-security-nwid-7219.html