Presented By O'Reilly and Cloudera
Make Data Work
March 28–29, 2016: Training
March 29–31, 2016: Conference
San Jose, CA

Security conference sessions

Tuesday, March 29

1:30pm–5:00pm Tuesday, 03/29/2016
Location: LL20 B
Mubashir Kazia (Cloudera), Benjamin Spivey (Cloudera), Sravya Tirukkovalur (Cloudera), Michael Yoder (Cloudera)
Average rating: ****.
(4.20, 10 ratings)
Mubashir Kazia, Ben Spivey, Sravya Tirukkovalur, and Michael Yoder guide participants through the process of securing a Hadoop cluster. Participants will start with a Hadoop cluster with no security and then add security features related to authentication, authorization, encryption of data at rest, encryption of data in transit, and complete data governance. Read more.

Wednesday, March 30

11:00am–11:40am Wednesday, 03/30/2016
Location: LL21 B
Tags: media
Ram Shankar Siva Kumar (Microsoft (Azure Security Data Science)), Cody Rioux (Netflix (Real-time Analytics))
Average rating: ***..
(3.83, 12 ratings)
In the era of large-volume security applications, false positives, as Gartner says, can make the difference between building an "indicator machine" and an "answering machine." Ram Shankar and Cody Rioux explore how to suppress false positives in security monitoring systems through use cases from Microsoft and Netflix. Read more.
11:50am–12:30pm Wednesday, 03/30/2016
Location: LL20 C
Tags: real-time
Leo Meyerovich (Graphistry), Joshua Patterson (NVIDIA), Mike Wendt (NVIDIA)
Average rating: ****.
(4.17, 6 ratings)
“Assuming breach” led to centralizing all logs (SIEMs), but incident response and forensics are still behind on the analytics side. Leo Meyerovich, Mike Wendt, and Joshua Patterson share how Graphistry and Accenture Technology Labs are rethinking data engineering and data analysis and modernizing end-to-end architectures. Read more.
11:50am–12:30pm Wednesday, 03/30/2016
Location: LL21 B
Tags: real-time
Jun Rao (Confluent)
Average rating: ****.
(4.33, 15 ratings)
With Apache Kakfa 0.9, the community has introduced a number of features to make data streams secure. Jun Rao explains the motivation for making these changes, discusses the design of Kafka security, and demonstrates how to secure a Kafka cluster. Jun also covers common pitfalls in securing Kafka and ongoing security work. Read more.
1:50pm–2:30pm Wednesday, 03/30/2016
Location: LL21 B
Pratik Verma (BlueTalon), Paulo Pereira (GE)
Average rating: ***..
(3.88, 8 ratings)
Pratik Verma and Paulo Pereira share three security architecture principles for Hadoop to protect sensitive data without disrupting users: modifying requests to filter content makes security transparent to users; centralizing data-access decisions and distributing enforcement makes security scalable; and using metadata instead of files or tables ensures systematic protection of sensitive data. Read more.
2:40pm–3:20pm Wednesday, 03/30/2016
Location: LL21 B
Chao Sun (Cloudera), Alex Leblang (Cloudera)
Average rating: ***..
(3.40, 5 ratings)
Chao Sun and Alex Leblang explore RecordService, a new solution that provides an API to read data from Hadoop storage managers and return them as canonical records. This eliminates the need for components to support individual file formats, handle security, perform auditing, and implement sophisticated IO scheduling and other common processing that is at the bottom of any computation. Read more.
4:20pm–5:00pm Wednesday, 03/30/2016
Location: LL21 B
Tags: real-time
Yinglian Xie (DataVisor)
Average rating: **...
(2.88, 8 ratings)
Yinglian Xie describes the anatomy of modern online services, where large armies of malicious accounts hide among legitimate users and conduct a variety of attacks. Yinglian demonstrates how the Spark framework can facilitate early detection of these types of attacks by analyzing billions of user actions. Read more.
5:10pm–5:50pm Wednesday, 03/30/2016
Location: LL21 B
Don Bosco Durai (Privacera)
Average rating: ****.
(4.50, 10 ratings)
Bosco Durai offers a top-down view of security in the Hadoop ecosystem. Bosco explores the right way to protect your data based on your enterprise's security requirements, as he covers the available mechanisms to achieve your information security goals. Read more.

Thursday, March 31

11:00am–11:40am Thursday, 03/31/2016
Location: 230 A
Chang She (Cloudera)
Average rating: ***..
(3.00, 2 ratings)
Many third-party apps are built on top of the Hadoop platform for data ingest, ETL, analytics, and predictive modeling. These services/apps need a data-governance layer for security and compliance, but it is often burdensome for each individual app to build its own. Chang She describes the challenges in building an extensible metadata layer that serves common governance needs for Hadoop. Read more.