Description: Abstract:
Visualizations have seen wide success in other disciplines, being used to convey complex information quickly and simply. They've even been used in movies to help the good guys track down the bad guys. So why don't system administrators use them for security analysis? Sure, there's a certain pride in being able to demonstrate your script-fu, but the reality is that when a tool is needed to solve an immediate problem, command line wins out over visualization. In this talk I will describe my foray into developing a visualization system using network data for security analysis. There will be lots of pretty pictures, with the discussion focusing on the lessons learned during this project along with the characteristics of this particular field that make useful visualizations especially difficult to create.
Bio:
Dr. Carrie Gates is the Chief Scientist (Security) for Dell Research. She is responsible for leading security research that transforms the strategic direction of Dell's products and services. This is achieved through establishing collaborative research projects between Dell business units and university faculty and students.
Dr. Gates has over 50 peer-reviewed publications in the computer and network security field. She has given over 20 invited talks, submitted over ten patent applications (with two awarded to date), served on thesis committees, taught courses, and is on several organizing and program committees for academic conferences. She co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010, was recognized for her work with a Women of Influence award from CSO magazine in October 2010, and was recognized by Diversity Journal’s 11th Annual Women Worth Watching in September 2012.
For More Information please visit:- http://bsidesraleigh.org
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.