SlideShare a Scribd company logo
Security Visualization

                Let’s Take A Step Back
                                                      VizSec - October 2012
                                                          Raffael Marty
                                                                              http://youtu.be/maCfIMTSJgs


pixlcloud |   turning data into actionable insights                                              copyright (c) 2012
Doushuai's Three Barriers
‘You	 make	 your	 way	 through	 the	 darkness	 of	 abandoned	 grasses	 in	 a	 
       search	 for	 meaning.	 As	 you	 do,	 where	 is	 the	 meaning?'




                                                     47th case of'The Gateless Barrier'
                                                          a collection of Zen koans
Raffael Marty
                                  13 years of log analysis and information visualization

   •Security visualization                                             pixlcloud
   •Big data and security intelligence

                                                                           IBM Research
   •Security data analyst
   •Entrepreneur
   •Trainer, speaker, and author
     Advisor in
pixlcloud |   turning data into actionable insights                                        copyright (c) 2012
Security Visualization
      • The  Most Exciting Field
      • SecViz is Hard ...
      • ... But Not THAT Hard
        • User Centric Design
      • Scaling Visualization
        • The Role of Data Mining
      • What’s Happening Out There?
pixlcloud |   turning data into actionable insights       copyright (c) 2012
Oblong Industries

pixlcloud |   turning data into actionable insights              copyright (c) 2012
The Most Exciting Field
       - help make data understandable for the masses - for everyone

       - help protect everyone on the planet from the bad guys




pixlcloud |   turning data into actionable insights                    copyright (c) 2012
The Most Exciting Field
        - an opportunity to solve interesting, big data problems


        - a possibility to apply data analytics to real-word problems


        - a chance to play with the coolest visualization capabilities



                               YOU can make a difference

pixlcloud |   turning data into actionable insights                      copyright (c) 2012
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back

More Related Content

Similar to Security Visualization - Let's Take A Step Back

PhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research NetworksPhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research Networks
Wolfgang Reinhardt
 
Open Source Search Applications
Open Source Search ApplicationsOpen Source Search Applications
Open Source Search Applications
Lucidworks (Archived)
 
Software Quality Analysis with Alitheia Core
Software Quality Analysis with Alitheia CoreSoftware Quality Analysis with Alitheia Core
Software Quality Analysis with Alitheia Core
Georgios Gousios
 
Ushahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time Evaluation
Ushahidi
 
Make my viral
Make my viralMake my viral
Make my viral
NINANC
 
Boom startup overview
Boom startup overviewBoom startup overview
Boom startup overview
bjb84
 
Cyber Solutions Network Infographic
Cyber Solutions Network InfographicCyber Solutions Network Infographic
Cyber Solutions Network Infographic
Booz Allen Hamilton
 
Marcom Buzz September- October, 2012
Marcom Buzz September- October, 2012Marcom Buzz September- October, 2012
Marcom Buzz September- October, 2012
marcombuzz
 
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solutionBitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Tiago Andrade e Silva
 
Workforce Needs of the California Solar Industry
Workforce Needs of the California Solar IndustryWorkforce Needs of the California Solar Industry
Workforce Needs of the California Solar Industry
Joel West
 
Creating A Lean Business System
Creating A Lean Business SystemCreating A Lean Business System
Creating A Lean Business System
JillWhinfrey
 
Lean Business System
Lean Business SystemLean Business System
Lean Business System
grogans
 
Lean Business System
Lean Business SystemLean Business System
Lean Business System
munroc
 
Creatingaleanbusinesssystem 12747094244253 Phpapp01
Creatingaleanbusinesssystem 12747094244253 Phpapp01Creatingaleanbusinesssystem 12747094244253 Phpapp01
Creatingaleanbusinesssystem 12747094244253 Phpapp01
tanergokalp
 
Design improv final pres
Design improv final presDesign improv final pres
Design improv final pres
Nathan Waterhouse
 
North Canton Master Plan Presentation 2
North Canton Master Plan Presentation 2North Canton Master Plan Presentation 2
North Canton Master Plan Presentation 2
ksuCUDC
 
Cep811 st air project - sarah haglund
Cep811 st air project - sarah haglundCep811 st air project - sarah haglund
Cep811 st air project - sarah haglund
sarahhaglund
 
Ugif 04 2011 informix notonlypointofsales-fr-001
Ugif 04 2011   informix notonlypointofsales-fr-001Ugif 04 2011   informix notonlypointofsales-fr-001
Ugif 04 2011 informix notonlypointofsales-fr-001
UGIF
 
Zipcar (HBR Case Study)
Zipcar (HBR Case Study)Zipcar (HBR Case Study)
Zipcar (HBR Case Study)
Daniel Zhao
 
Anteprima2010 intervento micucci 091209100056 Phpapp01
Anteprima2010 intervento micucci 091209100056 Phpapp01Anteprima2010 intervento micucci 091209100056 Phpapp01
Anteprima2010 intervento micucci 091209100056 Phpapp01
Massimo Micucci
 

Similar to Security Visualization - Let's Take A Step Back (20)

PhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research NetworksPhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research Networks
 
Open Source Search Applications
Open Source Search ApplicationsOpen Source Search Applications
Open Source Search Applications
 
Software Quality Analysis with Alitheia Core
Software Quality Analysis with Alitheia CoreSoftware Quality Analysis with Alitheia Core
Software Quality Analysis with Alitheia Core
 
Ushahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time Evaluation
 
Make my viral
Make my viralMake my viral
Make my viral
 
Boom startup overview
Boom startup overviewBoom startup overview
Boom startup overview
 
Cyber Solutions Network Infographic
Cyber Solutions Network InfographicCyber Solutions Network Infographic
Cyber Solutions Network Infographic
 
Marcom Buzz September- October, 2012
Marcom Buzz September- October, 2012Marcom Buzz September- October, 2012
Marcom Buzz September- October, 2012
 
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solutionBitocast - A hybrid BitTorrent and IP Multicast content distribution solution
Bitocast - A hybrid BitTorrent and IP Multicast content distribution solution
 
Workforce Needs of the California Solar Industry
Workforce Needs of the California Solar IndustryWorkforce Needs of the California Solar Industry
Workforce Needs of the California Solar Industry
 
Creating A Lean Business System
Creating A Lean Business SystemCreating A Lean Business System
Creating A Lean Business System
 
Lean Business System
Lean Business SystemLean Business System
Lean Business System
 
Lean Business System
Lean Business SystemLean Business System
Lean Business System
 
Creatingaleanbusinesssystem 12747094244253 Phpapp01
Creatingaleanbusinesssystem 12747094244253 Phpapp01Creatingaleanbusinesssystem 12747094244253 Phpapp01
Creatingaleanbusinesssystem 12747094244253 Phpapp01
 
Design improv final pres
Design improv final presDesign improv final pres
Design improv final pres
 
North Canton Master Plan Presentation 2
North Canton Master Plan Presentation 2North Canton Master Plan Presentation 2
North Canton Master Plan Presentation 2
 
Cep811 st air project - sarah haglund
Cep811 st air project - sarah haglundCep811 st air project - sarah haglund
Cep811 st air project - sarah haglund
 
Ugif 04 2011 informix notonlypointofsales-fr-001
Ugif 04 2011   informix notonlypointofsales-fr-001Ugif 04 2011   informix notonlypointofsales-fr-001
Ugif 04 2011 informix notonlypointofsales-fr-001
 
Zipcar (HBR Case Study)
Zipcar (HBR Case Study)Zipcar (HBR Case Study)
Zipcar (HBR Case Study)
 
Anteprima2010 intervento micucci 091209100056 Phpapp01
Anteprima2010 intervento micucci 091209100056 Phpapp01Anteprima2010 intervento micucci 091209100056 Phpapp01
Anteprima2010 intervento micucci 091209100056 Phpapp01
 

More from Raffael Marty

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
Raffael Marty
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Raffael Marty
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
Raffael Marty
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
Raffael Marty
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
Raffael Marty
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
Raffael Marty
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
Raffael Marty
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
Raffael Marty
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big Data
Raffael Marty
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
Raffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
Raffael Marty
 
Visualization for Security
Visualization for SecurityVisualization for Security
Visualization for Security
Raffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization Linux
Raffael Marty
 

More from Raffael Marty (20)

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big Data
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
 
Visualization for Security
Visualization for SecurityVisualization for Security
Visualization for Security
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization Linux
 

Security Visualization - Let's Take A Step Back

  • 1. Security Visualization Let’s Take A Step Back VizSec - October 2012 Raffael Marty http://youtu.be/maCfIMTSJgs pixlcloud | turning data into actionable insights copyright (c) 2012
  • 2. Doushuai's Three Barriers ‘You make your way through the darkness of abandoned grasses in a search for meaning. As you do, where is the meaning?' 47th case of'The Gateless Barrier' a collection of Zen koans
  • 3. Raffael Marty 13 years of log analysis and information visualization •Security visualization pixlcloud •Big data and security intelligence IBM Research •Security data analyst •Entrepreneur •Trainer, speaker, and author Advisor in pixlcloud | turning data into actionable insights copyright (c) 2012
  • 4. Security Visualization • The Most Exciting Field • SecViz is Hard ... • ... But Not THAT Hard • User Centric Design • Scaling Visualization • The Role of Data Mining • What’s Happening Out There? pixlcloud | turning data into actionable insights copyright (c) 2012
  • 5. Oblong Industries pixlcloud | turning data into actionable insights copyright (c) 2012
  • 6. The Most Exciting Field - help make data understandable for the masses - for everyone - help protect everyone on the planet from the bad guys pixlcloud | turning data into actionable insights copyright (c) 2012
  • 7. The Most Exciting Field - an opportunity to solve interesting, big data problems - a possibility to apply data analytics to real-word problems - a chance to play with the coolest visualization capabilities YOU can make a difference pixlcloud | turning data into actionable insights copyright (c) 2012