SlideShare a Scribd company logo
and suddenly I see ...
                            turning security data into information you can rely on.



                            wim remes
                            wremes@gmail.com
                            @wimremes


Tuesday 27 September 2011
about me ...




                                    information security manager
                                            big 4 company
                            incident response/security management/SIEM
                             [running in the 2011 (ISC)2 board elections]



Tuesday 27 September 2011
http://www.infosecmentors.com

                                           http://www.pentest-standard.org




                 http://www.eurotrashsecurity.eu


Tuesday 27 September 2011
BruCON

                 2009       2010     2011




Tuesday 27 September 2011
TOOLS


Tuesday 27 September 2011
Excel ...




                            http://peltiertech.com/WordPress/excel-chart-types/

Tuesday 27 September 2011
Taking the leap...




Tuesday 27 September 2011
MASTERS


Tuesday 27 September 2011
Edward Tufte




                       Stephen Few


Tuesday 27 September 2011
Stephen Few
               13 mistakes you’re no longer allowed to make
                            1. Exceeding the boundaries of a single screen
                            2. Supplying inadequate context for the data
                            3. Displaying excessive detail or precision
                            4. Choosing a deficient measure
                            5. Choosing inappropriate display media
                            6. Introducing meaningless variety
                            7. Using poorly designed display media
                            8. Encoding quantitative data inaccurately
                            9. Arranging the data poorly
                            10. Highlighting important data ineffectively or not at all
                            11. Cluttering the display with useless decoration
                            12. Misusing or overusing color
                            13. Designing an unattractive visual display



                                           http://www.perceptualedge.com/blog/

Tuesday 27 September 2011
Edward Tufte
                                  “Data can be beautiful,
                                  data should be beautiful”




Tuesday 27 September 2011
TIPS
                             and
                            TRICKS

Tuesday 27 September 2011
Infographs




                5   6       7   8 9 10   11   12 13




                 courtesy of ZoneAlarm (by Checkpoint)

Tuesday 27 September 2011
your favorite VM platform


                                                              Vulnerabilities by Severity Level

                                                          5

                                                          4

                                                          3

                                                          2

                                                          1

                                                              0      25      50      75     100


                                  compared to what ?
                                 last year? last month?




Tuesday 27 September 2011
GRC : Sponsored by Crayola   (tm)




Tuesday 27 September 2011
The dark side has ∏




Tuesday 27 September 2011
In other words ...

                                                                                                         DE



                            CN          US           NL            US           US           BE
                                                                              Great Lakes                KEYWEB
                            TimeNet   VolumeDrive   EuroAccess   RoadRunner               ISPSYSTEM-AS
                                                                                Comnet                     AS




Tuesday 27 September 2011
Or if you really want pie ...
                                          NL



                                 CN               BE



                                                   DE




                                         US



Tuesday 27 September 2011
Dashboarding 101




Tuesday 27 September 2011
Key take-aways


                1. Don’t rely on tools
                2. Think outside the box
                3. Simple = Better
                4. It’s not THAT hard




Tuesday 27 September 2011

More Related Content

Similar to And suddenly I see ... IDC IT Security Brussels 2011

Node Stream
Node StreamNode Stream
Node Stream
Abayomi Ayoola
 
Can Media Queries Save Us All?
Can Media Queries Save Us All?Can Media Queries Save Us All?
Can Media Queries Save Us All?
Tim Kadlec
 
Web heresies
Web heresiesWeb heresies
Web heresies
James Aylett
 
A Desktop UI with QtQuick
A Desktop UI with QtQuickA Desktop UI with QtQuick
A Desktop UI with QtQuick
njeisecke
 
Project Management and the iPad
Project Management and the iPadProject Management and the iPad
Project Management and the iPad
ProjectWizards
 
Tomatsu Seminar Presentation 110920
Tomatsu Seminar Presentation 110920Tomatsu Seminar Presentation 110920
Tomatsu Seminar Presentation 110920Chika Watanabe
 
Case Study - Panasonic Europe Powered by Apache Solr
Case Study - Panasonic Europe Powered by Apache SolrCase Study - Panasonic Europe Powered by Apache Solr
Case Study - Panasonic Europe Powered by Apache Solr
Lucidworks (Archived)
 

Similar to And suddenly I see ... IDC IT Security Brussels 2011 (8)

Node Stream
Node StreamNode Stream
Node Stream
 
Can Media Queries Save Us All?
Can Media Queries Save Us All?Can Media Queries Save Us All?
Can Media Queries Save Us All?
 
videocourse
videocoursevideocourse
videocourse
 
Web heresies
Web heresiesWeb heresies
Web heresies
 
A Desktop UI with QtQuick
A Desktop UI with QtQuickA Desktop UI with QtQuick
A Desktop UI with QtQuick
 
Project Management and the iPad
Project Management and the iPadProject Management and the iPad
Project Management and the iPad
 
Tomatsu Seminar Presentation 110920
Tomatsu Seminar Presentation 110920Tomatsu Seminar Presentation 110920
Tomatsu Seminar Presentation 110920
 
Case Study - Panasonic Europe Powered by Apache Solr
Case Study - Panasonic Europe Powered by Apache SolrCase Study - Panasonic Europe Powered by Apache Solr
Case Study - Panasonic Europe Powered by Apache Solr
 

More from wremes

Distributed Denial Of Service Introduction
Distributed Denial Of Service IntroductionDistributed Denial Of Service Introduction
Distributed Denial Of Service Introduction
wremes
 
Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysis
wremes
 
Crème Brulée :-)
Crème Brulée :-)Crème Brulée :-)
Crème Brulée :-)wremes
 
Vinnes jayson koken
Vinnes jayson kokenVinnes jayson koken
Vinnes jayson kokenwremes
 
Build Your Own Incident Response
Build Your Own Incident ResponseBuild Your Own Incident Response
Build Your Own Incident Response
wremes
 
Secure Abu Dhabi talk
Secure Abu Dhabi talkSecure Abu Dhabi talk
Secure Abu Dhabi talk
wremes
 
Collaborate, Innovate, Secure
Collaborate, Innovate, SecureCollaborate, Innovate, Secure
Collaborate, Innovate, Secure
wremes
 
Data Driven Infosec Services
Data Driven Infosec ServicesData Driven Infosec Services
Data Driven Infosec Services
wremes
 
SOPA 4 dummies
SOPA 4 dummiesSOPA 4 dummies
SOPA 4 dummies
wremes
 
Blackhat Workshop
Blackhat WorkshopBlackhat Workshop
Blackhat Workshopwremes
 
SIEM brown-bag presentation
SIEM brown-bag presentationSIEM brown-bag presentation
SIEM brown-bag presentation
wremes
 
10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM
wremes
 
Fosdem10
Fosdem10Fosdem10
Fosdem10
wremes
 
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
wremes
 
Open Source Security
Open Source SecurityOpen Source Security
Open Source Security
wremes
 
Teaser
TeaserTeaser
Teaser
wremes
 
Ossec Lightning
Ossec LightningOssec Lightning
Ossec Lightning
wremes
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
wremes
 
Pareto chart using Openoffice.org
Pareto chart using Openoffice.orgPareto chart using Openoffice.org
Pareto chart using Openoffice.org
wremes
 

More from wremes (19)

Distributed Denial Of Service Introduction
Distributed Denial Of Service IntroductionDistributed Denial Of Service Introduction
Distributed Denial Of Service Introduction
 
Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysis
 
Crème Brulée :-)
Crème Brulée :-)Crème Brulée :-)
Crème Brulée :-)
 
Vinnes jayson koken
Vinnes jayson kokenVinnes jayson koken
Vinnes jayson koken
 
Build Your Own Incident Response
Build Your Own Incident ResponseBuild Your Own Incident Response
Build Your Own Incident Response
 
Secure Abu Dhabi talk
Secure Abu Dhabi talkSecure Abu Dhabi talk
Secure Abu Dhabi talk
 
Collaborate, Innovate, Secure
Collaborate, Innovate, SecureCollaborate, Innovate, Secure
Collaborate, Innovate, Secure
 
Data Driven Infosec Services
Data Driven Infosec ServicesData Driven Infosec Services
Data Driven Infosec Services
 
SOPA 4 dummies
SOPA 4 dummiesSOPA 4 dummies
SOPA 4 dummies
 
Blackhat Workshop
Blackhat WorkshopBlackhat Workshop
Blackhat Workshop
 
SIEM brown-bag presentation
SIEM brown-bag presentationSIEM brown-bag presentation
SIEM brown-bag presentation
 
10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM
 
Fosdem10
Fosdem10Fosdem10
Fosdem10
 
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
 
Open Source Security
Open Source SecurityOpen Source Security
Open Source Security
 
Teaser
TeaserTeaser
Teaser
 
Ossec Lightning
Ossec LightningOssec Lightning
Ossec Lightning
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
Pareto chart using Openoffice.org
Pareto chart using Openoffice.orgPareto chart using Openoffice.org
Pareto chart using Openoffice.org
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

And suddenly I see ... IDC IT Security Brussels 2011

  • 1. and suddenly I see ... turning security data into information you can rely on. wim remes wremes@gmail.com @wimremes Tuesday 27 September 2011
  • 2. about me ... information security manager big 4 company incident response/security management/SIEM [running in the 2011 (ISC)2 board elections] Tuesday 27 September 2011
  • 3. http://www.infosecmentors.com http://www.pentest-standard.org http://www.eurotrashsecurity.eu Tuesday 27 September 2011
  • 4. BruCON 2009 2010 2011 Tuesday 27 September 2011
  • 6. Excel ... http://peltiertech.com/WordPress/excel-chart-types/ Tuesday 27 September 2011
  • 7. Taking the leap... Tuesday 27 September 2011
  • 9. Edward Tufte Stephen Few Tuesday 27 September 2011
  • 10. Stephen Few 13 mistakes you’re no longer allowed to make 1. Exceeding the boundaries of a single screen 2. Supplying inadequate context for the data 3. Displaying excessive detail or precision 4. Choosing a deficient measure 5. Choosing inappropriate display media 6. Introducing meaningless variety 7. Using poorly designed display media 8. Encoding quantitative data inaccurately 9. Arranging the data poorly 10. Highlighting important data ineffectively or not at all 11. Cluttering the display with useless decoration 12. Misusing or overusing color 13. Designing an unattractive visual display http://www.perceptualedge.com/blog/ Tuesday 27 September 2011
  • 11. Edward Tufte “Data can be beautiful, data should be beautiful” Tuesday 27 September 2011
  • 12. TIPS and TRICKS Tuesday 27 September 2011
  • 13. Infographs 5 6 7 8 9 10 11 12 13 courtesy of ZoneAlarm (by Checkpoint) Tuesday 27 September 2011
  • 14. your favorite VM platform Vulnerabilities by Severity Level 5 4 3 2 1 0 25 50 75 100 compared to what ? last year? last month? Tuesday 27 September 2011
  • 15. GRC : Sponsored by Crayola (tm) Tuesday 27 September 2011
  • 16. The dark side has ∏ Tuesday 27 September 2011
  • 17. In other words ... DE CN US NL US US BE Great Lakes KEYWEB TimeNet VolumeDrive EuroAccess RoadRunner ISPSYSTEM-AS Comnet AS Tuesday 27 September 2011
  • 18. Or if you really want pie ... NL CN BE DE US Tuesday 27 September 2011
  • 19. Dashboarding 101 Tuesday 27 September 2011
  • 20. Key take-aways 1. Don’t rely on tools 2. Think outside the box 3. Simple = Better 4. It’s not THAT hard Tuesday 27 September 2011