Applied Machine Learning for Identity and Access Management Workshop at Black Hat 2018

Identity and Access Management (IAM) is one of the most-important security controls. Now more than ever; especially with the advent of cloud computing and other distributed 'as a service' platforms. IAM systems create massive amounts of log and telemetry data, overwhelming security teams with their sheer volume. Aaron Turner and Raffael Marty have designed a 2-day, vendor-agnostic training course to provide participants with hands-on instruction for how to deal with these massive amounts of data. Using the latest approaches in machine learning and design, the course will give real-world examples of how to capture the maximum amount of data...
Read more

AI and ML in Cyber Security – And What Does That Have To Do With Visualization?

Adjacent to data visualization are all the different disciplines that help us getting from raw data to visualizations. There are the topics of big data, data mining, and data exploration which come to mind. The world has gotten quite confused and lax about using the terms artificial intelligence and machine learning. Often data mining, for example will be lumped underneath these topics. I have written a few pieces lately that talk about AI and ML in cyber security. They should help bringing a bit more clarity into the approaches and what is suited for the...
Read more

Delivering Security Insights with Data Analytics and Visualization

In early December, I gave the keynote at the ACSAC 2017 conference in Orlando, Florida. In the presentation I look at a number of topics around using big data for security. I start by showing what big data looks like for security, how the history of using security for big data is tightly linked to the progress in big data itself. I talk about machine learning and artificial intelligence and show some of the limits and dangers of how we currently apply machine learning in security and how we can apply data visualization to...
Read more

EEVi- Evaluating the Effectiveness of Visualisation in Cyber-Security

Hi all, I am a PhD researcher at University of Southampton and my PhD topic is Visualisation in Cyber Security. I have a questionnaire, for my thesis, aimed at people who have experience in Cyber Security, Visualization (or HCI) design or both. I would really appreciate if you can take some time out and fill out the questionnaire. Please refer to the link below for more information or contact me. :) https://www.isurvey.soton.ac.uk/23438 Thank you. Aneesha Sethi Aneesha.Sethi@soton.ac.uk
Read more

Security Analytics – Visualization – Big Data Workshop Black Hat 2017

VISUAL ANALYTICS – DELIVERING ACTIONABLE SECURITY INTELLIGENCE BlackHat 2017 - Las VegasBig Data is Getting Bigger - Visualization is Getting Easier - Learn How! Dates: July 22-23 & 24-25 Location: Las Vegas, USASIGN UP NOW OVERVIEW Big data and security intelligence are the two very hot topics in security. We are collecting more and more information from both the infrastructure, but increasingly also directly from our applications. This vast amount of data gets increasingly hard to understand. Terms like map reduce, hadoop, spark, elasticsearch, data science, etc. are part of many discussions. But what are those technologies and...
Read more

Secuirty Visualization Case Study

We recently posted a case study of how a Fortune 100 company is using Security Visualization as a front end to their various data collection systems. The Security Visualization allows the company's analysts to look at 100's of thousands of correlations each day and apply human pattern recognition to spot the "needles in the haystack". These are threats that are designed to avoid traditional intrusion and event management. Once the potential threat is identified and the log data is carved down to just the logs that are relevant, that subset of log data is then attached...
Read more

Security Visualization Requirements- Phd Thesis Survey

Hi, I am a Phd candidate in Informatics Institude at Middle East Technical University. I prepared an online survey as a part of my phd thesis. However, since this subject is relatively new I can not find anybody who may fill this survey around me in Turkey. The survey is in Google Forms, at link https://goo.gl/forms/xbfmrqJ4jxA4rvQ53. It is not very short :( It may take around 20 minutes but it is easy to fill, mostly composed of multi selection questions. Uncompleted survey results are not saved so the participants should complete the survey. Although we ask questions related to...
Read more

VizSec 2016 Call for Papers

The 13th IEEE Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cybersecurity community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. VizSec will be held in Baltimore, MD, USA in conjunction with IEEE VIS. The purpose of VizSec is to explore effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection,...
Read more

Visualizing Live Streams in 3D/VR

We've created a free tool for visualizing live streams of network traffic, using JMonkeyEngine (Java 3D gaming engine). Please take a look at deepnode.com - we would very much appreciate feedback from this community. Rather than focusing on mining of static datasets, this tool focuses on seeing activity over time, and controlling the timeline so that a human can connect the dots. Here's a link to information on the concept behind the visualization style. As for the screenshot, this video explains what you're looking at.
Read more