SlideShare a Scribd company logo
1 of 42
Download to read offline
SEIZE THE DATA. 2015
PredictingCyberSecurityIndustry
HP Security Briefing 21
John Park/ August 11th, 2015
It all starts with a simple question.
“What is happening with
computer security ?”
First solution:
“READ EVERYTHING.”
After 5000 hours of reading…
Lesson #1: There is more info than one
can read in a lifetime.
Lesson #2: The more one reads, the
more it sounds the same.
Second solution:
“USE MACHINES.”
Natural Language Processing (NLP)
Word-smithing
Mass Media 101: Journalism
The more important it is,
the more it’s talked about.
Mass Media 102: Advertising
The more it’s talked about,
the more important it becomes.
Mid-way: questions?
Game Plan:
Count the number of words
and sequences of words (n-grams).
Data tip #1:
Start with a high-quality dataset.
HPSR Cyber Risk Report 2015
NLP tip #1: Word (1-gram) frequency
shows the ingredients.
NLP tip #2: Word pair (2-grams) are
intersections. More niche.
NLP tip #3: 3+ grams are super-niche.
May be too unique.
NLP tip #4: Stemming
lowercase + substr(word,0,7)
NLP tip #5: Stop-words (is, the, ...)
Normalize against general text.
(go over the top 300 manually)
NLP tip #6:
If timeline analysis,
balance the “before” and the “after”.
NLP tip #7:
It’s always best to have final
human verification.
Use the common sense.
Find similar exploiters.
Without further ado,
let’s see some results.
Result #1: Top 5 words (2013+2014)
1. Malware
2. Security
3. Attack
4. System
5. Exploits
Power Law/Long-Tail
Result #2: Top 5 n-grams (2013+2014)
1. Operating System
2. Targeted Attack
3. Exploit Kits
4. United States
5. Social Engineering
Result #3: Security conferences
Black Hat
1. attack
2. security
3. presentation
4. system
5. talk
Def Con
1. security
2. talk
3. attack
4. network
5. hackers
Virus Bulletin
1. malware
2. system
3. security
4. app
5. detection
Result #4: National mentions
1. United States
2. Russia
3. China
4. Germany
5. Brazil
One more thing…
What we really want:
Predictions
Prediction #1: Word frequency 2015
(extrapolated from 2013 + 2014)
1. Security (2)
2. Attacks (3)
3. Malware (1)
4. System (4)
5. Data (6)
Prediction #1: n-gram frequency 2015
(extrapolated from 2013 + 2014)
1. Operating System (1)
2. Malware Family (9)
3. Exploit Kits (3)
4. Targeted Attacks (2)
5. Cyber Security (19)
And another thing…
What we really want:
Competitive Analysis
What are other companies in the industry
working on?
Microsoft
1. computers
2. detected
3. exploits
4. Microsoft
5. malware
FireEye
1. attack
2. malware
3. targeted
4. FireEye
5. verticals
Verizon
1. data
2. incidents
3. breaches
4. attacks
5. organizations
More data on
HP Security Briefing 21:
Security is about defending the System
against Attacks, that start with Exploits
and controlled by Malware.
SEIZE THE DATA. 2015

More Related Content

What's hot

Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017chrissanders88
 
Computer literacy - Lesson 2
Computer literacy - Lesson 2Computer literacy - Lesson 2
Computer literacy - Lesson 2mmuller_edtech
 
Agentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterAgentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterIvanti
 
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesDaniel Billing
 
3. Mini seminar 2 - Mylyn
3. Mini seminar 2  - Mylyn3. Mini seminar 2  - Mylyn
3. Mini seminar 2 - MylynLeonid Maslov
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Huntingchrissanders88
 

What's hot (7)

Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017
 
Jsm big-data
Jsm big-dataJsm big-data
Jsm big-data
 
Computer literacy - Lesson 2
Computer literacy - Lesson 2Computer literacy - Lesson 2
Computer literacy - Lesson 2
 
Agentless Patch Management for the Data Center
Agentless Patch Management for the Data CenterAgentless Patch Management for the Data Center
Agentless Patch Management for the Data Center
 
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing StratagiesTesting or Hacking: Real Advice on Effective Security Testing Stratagies
Testing or Hacking: Real Advice on Effective Security Testing Stratagies
 
3. Mini seminar 2 - Mylyn
3. Mini seminar 2  - Mylyn3. Mini seminar 2  - Mylyn
3. Mini seminar 2 - Mylyn
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
 

Similar to HPBigData2015Predicting Cyber Security Industry-JohnPark

Are We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableAre We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableJustin Berman
 
New text document
New text documentNew text document
New text documentsleucwnq
 
New text document
New text documentNew text document
New text documentsleucwnq
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceSparkCognition
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint SecurityAdrian Sanabria
 
Cybersecurity in 2016
Cybersecurity in 2016Cybersecurity in 2016
Cybersecurity in 2016Ben Finke
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxaudeleypearl
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранSigma Software
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecurityVlad Styran
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsLumension
 
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...CODE BLUE
 
Security Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! HoustonSecurity Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! HoustonSplunk
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusSarah Vanier
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
L1 Slides – Online Safety – KS4.pptx
L1 Slides – Online Safety – KS4.pptxL1 Slides – Online Safety – KS4.pptx
L1 Slides – Online Safety – KS4.pptxITRIS1
 

Similar to HPBigData2015Predicting Cyber Security Industry-JohnPark (20)

Are We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableAre We Secure? Answering the Unanswerable
Are We Secure? Answering the Unanswerable
 
New text document
New text documentNew text document
New text document
 
New text document
New text documentNew text document
New text document
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
Cybersecurity in 2016
Cybersecurity in 2016Cybersecurity in 2016
Cybersecurity in 2016
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
 
Security Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! HoustonSecurity Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! Houston
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
L1 Slides – Online Safety – KS4.pptx
L1 Slides – Online Safety – KS4.pptxL1 Slides – Online Safety – KS4.pptx
L1 Slides – Online Safety – KS4.pptx
 

HPBigData2015Predicting Cyber Security Industry-JohnPark