cta

Get Started

cloud

Ready to Get Started?

Download sandbox

How can we help you?

closeClose button
May 26, 2017 | Tom Hastain | Hortonworks Case Study

Precision Medicine: a 5 Million Person Case Study

May 26, 2017 | Carole Gum | Hortonworks Community Connection

Don’t miss the Business of Data at DataWorks Summit

May 26, 2017 | Anna Yong

Open Source Talent Powers Big Data Success

Viewing posts by: Michael Schiebel« Back to all

X
FILTERS
ALL
TECHNICAL
BUSINESS

All Topics















All Channels











CLEAR FILTERS

I figured I’d step away from my Cybersecurity Architecture series and CISO’s View series and share my experience in speaking to folks about cyber security.  Ideally, you should have a quick 20 second elevator pitch ready that explains the value a security program delivers to the business without using an security terminology. Using a security […]

I decided to take a break from my Cybersecurity Architecture series and CISO’s View series to give my thoughts on this year’s RSA conference while things are still fresh.  First off, I enjoyed meeting with old colleagues and many security people that I respect which justified the trip as far as I’m concerned.  I’m really amazed […]

Welcome back to my blog series, the CISO’s View.  We started with  CISO’s View: metrics part 1, looking at metrics and why they are the foundation of a successful security program. In CISO’s View: metrics part 2, we figured out how to create metrics that are tied to the company strategy and show the value […]

Welcome back to my blog series, the CISO’s View.  In my last article, CISO’s View: metrics part 1, we started looking at metrics and why they are the foundation of a successful security program. Today, we’ll look at how we derive metrics that communicate value in a way that’s tied to the company strategy. Hopefully […]

Welcome back to my blog series, the CISO’s View.  In my last article, CISO’s View: Why an integrated approach matters, I stirred up the waters a bit by stating that the CISO’s first and most fundamental job is taking all this security data, threats, vulnerabilities, policy violations, and transforming it into business language that shows […]

If you’ve been reading along, you’re aware of the lightbulb moments from my article, “echo: hello world”, that allowed me to discover the benefits of an analytic approach to cybersecurity.  This is the start of my new blog series, The CISO’s View, where I focus on the executive level business concerns facing security leaders. Today, […]

Welcome back to my blogging adventure.  When we left off in my Cybersecurity Architecture series, Cybersecurity Architecture: All about Sensors, we started to touch on some of the requirements our sensors require from the modern data plane. Today, we are going to dive deep into those requirements and walk through how we can leverage Hortonworks […]

Welcome back to my blogging adventure.  I want to take a break today from walking through the cybersecurity architecture for an analytic based incident response process to step back and look at the big picture in applying a mature analytic lifecycle to a cybersecurity analytic platform.  I’ve had many conversations and read many articles recently […]

Welcome back to my blogging adventure.  In my Cybersecurity Architecture series, we’ve spent some time discussing the value an analytic approach to the incident response process. In the last article, Conceptual Cybersecurity Architecture for analytic response, we started to drill into the solution space by giving a high level architecture to drive our discussion.  Let’s […]

Welcome back to my blogging adventure.  If you’ve been reading my Cybersecurity series;  “echo: hello world”, “Cybersecurity: the end of rules are nigh”, and Cybersecurity: why context matters and how do we find it you know just how much time I’ve spent explaining why an integrated cybersecurity analytic solution should focus on delivering value and […]

Welcome back to my blogging adventure.  If you’ve been reading along, you’re aware of the lightbulb moments from my article, “echo: hello world”, that allowed me to discover the benefits of an analytic approach to cybersecurity.  Next I gave a little slice in the life of our intrepid SOC analyst in, “Cybersecurity: the end of […]

Do you like looking for the needle in the field of haystacks? Do I have a job for you; security operations center (SOC) analyst. You will spend your days looking at hundreds of thousands of alerts – created by rules engines – where only a very few a week actually matter.  Your job is to […]

Hello everyone and welcome to the start of my blogging adventure. I’m Mike Schiebel, Cybersecurity Strategist at Hortonworks where I’m focused on cybersecurity to inject enterprise level security features into the Hadoop ecosystem and provide input into the Apache Metron open source project.  I figured introductions are in order, to explain the where and why […]