In our last article, we looked at sources of security data and emphasized the importance of a data strategy before you get started. Now, assuming that your organization has formulated a strategy and set goals for what you want to achieve with Big Data, there are several paths toward implementation.