Presented By O’Reilly and Cloudera
Make Data Work
21–22 May 2018: Training
22–24 May 2018: Tutorials & Conference
London, UK

Schedule: Platform security and cybersecurity sessions

13:3017:00 Tuesday, 22 May 2018
Location: Capital Suite 15 Level: Intermediate
Secondary topics:  Security and Privacy
Mark Donsky (Okera), Steffen Maerkl (Cloudera), Andre Araujo (Cloudera)
Hybrid big data deployments present significant new security risks. Security admins must ensure a consistently secured and governed experience for end users and administrators across multiple workloads. Mark Donsky, Steffen Maerkl, and André Araujo share best practices for meeting these challenges as they walk you through securing a Hadoop cluster. Read more.
12:0512:45 Wednesday, 23 May 2018
Location: Capital Suite 7 Level: Intermediate
Secondary topics:  Security and Privacy
Federico Leven (ReactoData)
Average rating: **...
(2.67, 3 ratings)
The apparent difficulty of managing Hadoop compared to more traditional and proprietary data products makes some companies wary of the Hadoop ecosystem, but managing security is becoming more accessible in the Hadoop space, particularly in the Cloudera stack. Federico Leven offers an overview of an end-to-end security deployment on Hadoop and the data and security governance policies implemented. Read more.
14:0514:45 Wednesday, 23 May 2018
Location: Capital Suite 7 Level: Intermediate
Secondary topics:  Security and Privacy
Joshua Patterson (NVIDIA), Chau Dang (NVIDIA)
Joshua Patterson and Mike Wendt explain how NVIDIA used GPU-accelerated open source technologies to improve its cyberdefense platforms by leveraging software from the GPU Open Analytics Initiative (GOAI) and how the company accelerated anomaly detection with more efficient machine learning models, faster deployment, and more granular data exploration. Read more.
16:3517:15 Wednesday, 23 May 2018
Location: Capital Suite 7 Level: Non-technical
Secondary topics:  Security and Privacy
Thomas Phelan (HPE BlueData)
Recent headline-grabbing data breaches demonstrate that protecting data is essential for every enterprise. The best-of-breed approach for big data is HDFS configured with Transparent Data Encryption (TDE), but TDE can be difficult to configure and manage—issues that are only compounded when running on Docker containers. Thomas Phelan discusses these challenges and explains how to overcome them. Read more.
17:2518:05 Wednesday, 23 May 2018
Location: Capital Suite 7 Level: Beginner
Secondary topics:  Security and Privacy
Nikki Rouda (Cloudera), Nick Curcuru (Mastercard)
Average rating: ****.
(4.00, 2 ratings)
Having so many cloud-based analytics services available is a dream come true. However, it's a nightmare to manage proper security and governance across all those different services. Nikki Rouda and Nick Curcuru share advice on how to minimize the risk and effort in protecting and managing data for multidisciplinary analytics and explain how to avoid the hassle and extra cost of siloed approaches. Read more.
11:1511:55 Thursday, 24 May 2018
Location: S11A Level: Intermediate
Secondary topics:  Data Platforms, E-commerce and Retail
Neelesh Salian (Stitch Fix)
Average rating: *....
(1.00, 1 rating)
Neelesh Srinivas Salian offers an overview of the compute infrastructure used by the data science team at Stitch Fix, covering the architecture, tools within the larger ecosystem, and the challenges that the team overcame along the way. Read more.