SlideShare una empresa de Scribd logo
1 de 43
Descargar para leer sin conexión
Security Visualization

                Let’s Take A Step Back
                                                      VizSec - October 2012
                                                          Raffael Marty
                                                                              http://youtu.be/maCfIMTSJgs


pixlcloud |   turning data into actionable insights                                              copyright (c) 2012
Doushuai's Three Barriers
‘You	 make	 your	 way	 through	 the	 darkness	 of	 abandoned	 grasses	 in	 a	 
       search	 for	 meaning.	 As	 you	 do,	 where	 is	 the	 meaning?'




                                                     47th case of'The Gateless Barrier'
                                                          a collection of Zen koans
Raffael Marty
                                  13 years of log analysis and information visualization

   •Security visualization                                             pixlcloud
   •Big data and security intelligence

                                                                           IBM Research
   •Security data analyst
   •Entrepreneur
   •Trainer, speaker, and author
     Advisor in
pixlcloud |   turning data into actionable insights                                        copyright (c) 2012
Security Visualization
      • The  Most Exciting Field
      • SecViz is Hard ...
      • ... But Not THAT Hard
        • User Centric Design
      • Scaling Visualization
        • The Role of Data Mining
      • What’s Happening Out There?
pixlcloud |   turning data into actionable insights       copyright (c) 2012
Oblong Industries

pixlcloud |   turning data into actionable insights              copyright (c) 2012
The Most Exciting Field
       - help make data understandable for the masses - for everyone

       - help protect everyone on the planet from the bad guys




pixlcloud |   turning data into actionable insights                    copyright (c) 2012
The Most Exciting Field
        - an opportunity to solve interesting, big data problems


        - a possibility to apply data analytics to real-word problems


        - a chance to play with the coolest visualization capabilities



                               YOU can make a difference

pixlcloud |   turning data into actionable insights                      copyright (c) 2012
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back

Más contenido relacionado

Similar a Security Visualization - Let's Take A Step Back

PhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research NetworksPhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research NetworksWolfgang Reinhardt
 
Software Quality Analysis with Alitheia Core
Software Quality Analysis with Alitheia CoreSoftware Quality Analysis with Alitheia Core
Software Quality Analysis with Alitheia CoreGeorgios Gousios
 
Ushahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi
 
Make my viral
Make my viralMake my viral
Make my viralNINANC
 
Boom startup overview
Boom startup overviewBoom startup overview
Boom startup overviewbjb84
 
Cyber Solutions Network Infographic
Cyber Solutions Network InfographicCyber Solutions Network Infographic
Cyber Solutions Network InfographicBooz Allen Hamilton
 
Marcom Buzz September- October, 2012
Marcom Buzz September- October, 2012Marcom Buzz September- October, 2012
Marcom Buzz September- October, 2012marcombuzz
 
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solutionBitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solutionTiago Andrade e Silva
 
Workforce Needs of the California Solar Industry
Workforce Needs of the California Solar IndustryWorkforce Needs of the California Solar Industry
Workforce Needs of the California Solar IndustryJoel West
 
Creating A Lean Business System
Creating A Lean Business SystemCreating A Lean Business System
Creating A Lean Business SystemJillWhinfrey
 
Lean Business System
Lean Business SystemLean Business System
Lean Business Systemgrogans
 
Creatingaleanbusinesssystem 12747094244253 Phpapp01
Creatingaleanbusinesssystem 12747094244253 Phpapp01Creatingaleanbusinesssystem 12747094244253 Phpapp01
Creatingaleanbusinesssystem 12747094244253 Phpapp01tanergokalp
 
Lean Business System
Lean Business SystemLean Business System
Lean Business Systemmunroc
 
North Canton Master Plan Presentation 2
North Canton Master Plan Presentation 2North Canton Master Plan Presentation 2
North Canton Master Plan Presentation 2ksuCUDC
 
Cep811 st air project - sarah haglund
Cep811 st air project - sarah haglundCep811 st air project - sarah haglund
Cep811 st air project - sarah haglundsarahhaglund
 
Ugif 04 2011 informix notonlypointofsales-fr-001
Ugif 04 2011   informix notonlypointofsales-fr-001Ugif 04 2011   informix notonlypointofsales-fr-001
Ugif 04 2011 informix notonlypointofsales-fr-001UGIF
 
Zipcar (HBR Case Study)
Zipcar (HBR Case Study)Zipcar (HBR Case Study)
Zipcar (HBR Case Study)Daniel Zhao
 
Anteprima2010 intervento micucci 091209100056 Phpapp01
Anteprima2010 intervento micucci 091209100056 Phpapp01Anteprima2010 intervento micucci 091209100056 Phpapp01
Anteprima2010 intervento micucci 091209100056 Phpapp01Massimo Micucci
 

Similar a Security Visualization - Let's Take A Step Back (20)

PhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research NetworksPhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research Networks
 
Open Source Search Applications
Open Source Search ApplicationsOpen Source Search Applications
Open Source Search Applications
 
Software Quality Analysis with Alitheia Core
Software Quality Analysis with Alitheia CoreSoftware Quality Analysis with Alitheia Core
Software Quality Analysis with Alitheia Core
 
Ushahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time Evaluation
 
Make my viral
Make my viralMake my viral
Make my viral
 
Boom startup overview
Boom startup overviewBoom startup overview
Boom startup overview
 
Cyber Solutions Network Infographic
Cyber Solutions Network InfographicCyber Solutions Network Infographic
Cyber Solutions Network Infographic
 
Marcom Buzz September- October, 2012
Marcom Buzz September- October, 2012Marcom Buzz September- October, 2012
Marcom Buzz September- October, 2012
 
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solutionBitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solution
 
Workforce Needs of the California Solar Industry
Workforce Needs of the California Solar IndustryWorkforce Needs of the California Solar Industry
Workforce Needs of the California Solar Industry
 
Creating A Lean Business System
Creating A Lean Business SystemCreating A Lean Business System
Creating A Lean Business System
 
Lean Business System
Lean Business SystemLean Business System
Lean Business System
 
Creatingaleanbusinesssystem 12747094244253 Phpapp01
Creatingaleanbusinesssystem 12747094244253 Phpapp01Creatingaleanbusinesssystem 12747094244253 Phpapp01
Creatingaleanbusinesssystem 12747094244253 Phpapp01
 
Lean Business System
Lean Business SystemLean Business System
Lean Business System
 
Design improv final pres
Design improv final presDesign improv final pres
Design improv final pres
 
North Canton Master Plan Presentation 2
North Canton Master Plan Presentation 2North Canton Master Plan Presentation 2
North Canton Master Plan Presentation 2
 
Cep811 st air project - sarah haglund
Cep811 st air project - sarah haglundCep811 st air project - sarah haglund
Cep811 st air project - sarah haglund
 
Ugif 04 2011 informix notonlypointofsales-fr-001
Ugif 04 2011   informix notonlypointofsales-fr-001Ugif 04 2011   informix notonlypointofsales-fr-001
Ugif 04 2011 informix notonlypointofsales-fr-001
 
Zipcar (HBR Case Study)
Zipcar (HBR Case Study)Zipcar (HBR Case Study)
Zipcar (HBR Case Study)
 
Anteprima2010 intervento micucci 091209100056 Phpapp01
Anteprima2010 intervento micucci 091209100056 Phpapp01Anteprima2010 intervento micucci 091209100056 Phpapp01
Anteprima2010 intervento micucci 091209100056 Phpapp01
 

Más de Raffael Marty

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's AdvantageRaffael Marty
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIRaffael Marty
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationRaffael Marty
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at ScaleRaffael Marty
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big DataRaffael Marty
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data VisualizationRaffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?Raffael Marty
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityRaffael Marty
 
Visualization for Security
Visualization for SecurityVisualization for Security
Visualization for SecurityRaffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?Raffael Marty
 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxRaffael Marty
 

Más de Raffael Marty (20)

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big Data
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
 
Visualization for Security
Visualization for SecurityVisualization for Security
Visualization for Security
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization Linux
 

Security Visualization - Let's Take A Step Back

  • 1. Security Visualization Let’s Take A Step Back VizSec - October 2012 Raffael Marty http://youtu.be/maCfIMTSJgs pixlcloud | turning data into actionable insights copyright (c) 2012
  • 2. Doushuai's Three Barriers ‘You make your way through the darkness of abandoned grasses in a search for meaning. As you do, where is the meaning?' 47th case of'The Gateless Barrier' a collection of Zen koans
  • 3. Raffael Marty 13 years of log analysis and information visualization •Security visualization pixlcloud •Big data and security intelligence IBM Research •Security data analyst •Entrepreneur •Trainer, speaker, and author Advisor in pixlcloud | turning data into actionable insights copyright (c) 2012
  • 4. Security Visualization • The Most Exciting Field • SecViz is Hard ... • ... But Not THAT Hard • User Centric Design • Scaling Visualization • The Role of Data Mining • What’s Happening Out There? pixlcloud | turning data into actionable insights copyright (c) 2012
  • 5. Oblong Industries pixlcloud | turning data into actionable insights copyright (c) 2012
  • 6. The Most Exciting Field - help make data understandable for the masses - for everyone - help protect everyone on the planet from the bad guys pixlcloud | turning data into actionable insights copyright (c) 2012
  • 7. The Most Exciting Field - an opportunity to solve interesting, big data problems - a possibility to apply data analytics to real-word problems - a chance to play with the coolest visualization capabilities YOU can make a difference pixlcloud | turning data into actionable insights copyright (c) 2012