North Texas DAMA
Chapter Meeting -- September 21, 2017 (9-11 AM)
Breakfast Starts at 8 AM
Presentations Start at 9 AM
1500 Solana Blvd
Building Two (CC2), First Floor, Room 575A
Westlake, TX 76262
Welcome (15 minutes)
Session 1 (50 minutes): Stop Data Wrangling, Start Transforming Data to Intelligence
Babar Bhatti: Analytics, Data Science and Product Mgmt Consultant
Every Data Science endeavor has four phases: Acquire, Prepare, Analyze and Act. The quality of analysis and insights depend on how well the data has been prepared. When done right, data preparation increases the volume, depth and speed of insight. The challenge is that, data preparation, better known as data wrangling, is a tedious and laborious job that requires a significant degree of effort and specialized skill set. The focus of this talk is how to do it through data wrangling so you can start extracting valuable insights quickly and efficiently.
Babar is a seasoned entrepreneur in the areas of data science, analytics and B2B software. He was the founder and chief executive of MutualMind, a Dallas based social analytics company that served B2B customers and was sold in 2016. Prior to that he worked as software and systems architect in Sirius XM and Verizon. His areas of interest include data science, machine learning, cloud computing and customer experience.
Babar holds dual masters from MIT. He enjoys reading, traveling, spending time outdoors with his family and volunteering for non-profits.
Session 2 (50 minutes): Information Security - Shifting from "Incident" to "Continuous" Response
Bill White (CISSP, CISA, CRISC): Security Architecture Team â€“ Information Security, State Farm
The core of the next-generation security protection process will be continuous, pervasive monitoring and visibility that is constantly analyzed for indications of compromise. Security Monitoring will encompass as many layers of the IT stack as possible including network activity, endpoints, system interactions, application transactions and user activity.
The presentation will provide several security related scenarios where centralized security data analytics and adaptive security architecture are used to respond in a dynamic way to enable this next generation security protection.
The design and benefit of joining the foundational elements of intelligence, context, and correlation with an adaptive architecture will be discussed. I will look behind the curtain of "marketecture" to the real and aspirational solutions for the SOC that will likely materialize as vendor products mature over the next few years.
Bill is an Information Technology professional with 30 years' experience in IT Security, Fraud investigation, Information Security, and Risk Assessment processes. He is a member of the team responsible for architectural work around the DETECT, RESPOND and RECOVER functions from the NIST Cybersecurity Framework.Â He is a specialist in the DETECT function, but also has extensive experience in Incident Response and Risk.Â He has presented educational and informational talks on how to utilize "Cyber Kill Chain" to better defend networks. Also, he is recognized for presentations and informational talks on aspirational architecture titled: "Intelligence Driven Adaptive Security Architecture" (Self-Defending Infrastructure).
Wrap-up and Social
Take the opportunity to socialize with your peers. Please contact the firstname.lastname@example.org if you have any questions.