The document discusses using data visualization techniques in cyber security. It notes that cyber threats pose serious challenges and over 200 attacks occurred on industrial control systems in 2013. It then outlines some of the key roles machines and human cyber analysts play in cyber defense. The rest of the document provides examples of how different types of security data, like network traffic, logs, and events, can be visualized using techniques like node-link diagrams, histograms, dashboards and more to help analysts detect anomalies, patterns, and relationships to better understand threats and make timely decisions. It emphasizes the importance of situational awareness and a joint effort between humans and machines in cyber security.