SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
AI  Truths  and  Myths
Dr.  Chase  Cunningham,  
Principal  Analyst  Security  and  Risk
September  28,  2017
3©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
Let’s  Define  AI….      Or  At  Least  Be  Real  About  It
AI  (Today)=  
Math,  Patterns,  Computations,  Iterations  
4©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
Artificial  Intelligence  As  It  Stands  Today
AI  =  
Data            +        Machine  Learning  +      Human  Interaction
5©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
What  AI  is  Not
6©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
Timeline  of  AI  Failures
• Failure  of  machine  translation1966
• Abandonment  of  connectionism1970
• DARPA's  frustration  with  the  Speech  Understanding  Research  program  at  Carnegie  Mellon  University1971−75
• Large  decrease  in  AI  research  in  the  United  Kingdom  in  response  to  the  Lighthill report1973
• DARPA's  cutbacks  to  academic  AI  research  in  general1973−74
• Collapse  of  the  Lisp  machine  market1987
• Cancellation  of  new  spending  on  AI  by  the  Strategic  Computing  Initiative1988
• Expert  systems  slowly  reaching  the  bottom1993
• Quiet  disappearance  of  the  fifth-­generation  computer  project's  original  goals1990s
7©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
Watson
• IBM’s  Artificial  Intelligence  
computer  system
• Capable  of  answering  
questions  in  natural  
language
• Competed  against  
champions  on  Jeopardy  
and  won
8©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
Watson’s  Sources  of  Information
• Encyclopedias
• Dictionaries
• Thesauri  
• Newswire  articles
• Literary  works
• Databases,  taxonomies,  
and  ontologies
• Wikipedia  articles
And  more
9©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
How  Watson  Works
• Receives  the  clues  (questions)  as  electronic  texts
• It  then  divides  these  texts  into  different  keywords  and  sentence  
fragments  and  searches  for  statistically  related  phrases
• Quickly  executes  thousands  of  language  analysis  algorithms  
• The  more  algorithms  that  find  the  same  answer  increase  Watson’s  
confidence  of  his  answer  and  it  calculates  whether  or  not  to  make  a  
guess  
10©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
What  is  Machine  Learning?
Applications  of  algorithms  that
• improve  their  performance
• at  some  task
• with  experience
11©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
12©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
Building  Blocks  of  AI
• Classification
• Compare  unknown  against  larger  
known  dataset
• Clustering
• Find  data  points  similar  in  nature
• Regression
• Measure  statistical  relationships  
between  variables  based  on  
history  or  training  set
13©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
Where  Companies  Want  to  Use  AI
34%  of  companies  
plan/are  using  AI  to  
mitigate  security  risks
14©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
15©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
What  is  Intelligence:  The  Turing  Test
A machine can be described as a
thinking machine if it passes the
Turing Test.
i.e. If a human agent is engaged
in two isolated dialogues
(connected by teletype say); one
with a computer, and the other
with another human and the
human agent cannot reliably
identify which dialogue is with
the computer.
FORRESTER.COM
Thank  you
©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
Dr.  Chase  Cunningham
ccunningham@forrester.com
Separating	
  Myth	
  from	
  Reality
Machine	
  Learning	
  and	
  A.I.	
  in	
  Cybersecurity
18
Hey.	
  I’m	
  Stephan	
  Jou.	
  I	
  like	
  analytics.
• CTO	
  at	
  Interset
• Previously:	
  Cognos and	
  IBM’s	
  Business	
  Analytics	
  CTO	
  
Office
• Big	
  data	
  analytics,	
  visualization,	
  cloud,	
  predictive	
  
analytics,	
  data	
  mining,	
  neural	
  networks,	
  mobile,	
  
dashboarding and	
  semantic	
  search
• M.Sc.	
  in	
  Computational	
  Neuroscience	
  and	
  
Biomedical	
  Engineering,	
  and	
  a	
  dual	
  B.Sc.	
  in	
  
Computer	
  Science	
  and	
  Human	
  Physiology,	
  all	
  from	
  
the	
  University	
  of	
  Toronto
19
About	
  Interset
At	
  Interset,	
  we	
  catch	
  bad	
  guys	
  with	
  math.
• Data	
  science	
  and	
  machine	
  learning	
  on	
  big	
  data	
  analytics	
  
technologies
• Cover	
  multiple	
  cybersecurity	
  use	
  cases
• Based	
  in	
  Ottawa,	
  Ontario,	
  Canada
• Award	
  winning	
  threat	
  detection	
  platform
• Successful	
  deployments	
  across	
  multiple	
  verticals
• Clients	
  include	
  US	
  Intelligence	
  Communities
And	
  a	
  leader	
  in	
  security	
  analytics.
20
Best	
  Practices	
  and	
  Real-­‐Life	
  Examples
There	
  is	
  too	
  much	
  FUD,	
  
confusion	
  and	
  snake	
  oil	
  out	
  
there!
How	
  can	
  we	
  separate
myth	
  from	
  reality?
Q A
Construct	
  a	
  mathematical	
  proof	
  of	
  correctness!
Best	
  practices,	
  patterns,	
  and	
  lessons	
  
from	
  actual	
  real-­‐life	
  case	
  studies!
21
Case	
  Study	
  #1:	
  $20B	
  Manufacturer
X
2  Engineers  
stole  data
1  Year
$1  Million  Spent
Large  security  
vendor  failed  to  
find  anything  
2  Weeks
Easily  
identified  the  2  
Engineers
Found  3  
additional  users  
stealing  data  in  
North  America
Found  8  
additional  users  
stealing  data  in  
China
22
Lesson	
  #1:	
  The	
  Math	
  Matters	
  – Test	
  It
• Too	
  much	
  snake	
  oil
• The	
  math	
  matters	
  – but	
  the	
  use	
  case	
  matters	
  
more!
• Don’t	
  rely	
  on	
  a	
  smoking	
  gun
Recommendations
• Agree	
  on	
  the	
  use	
  cases	
  in	
  advance
• Use	
  a	
  proof-­‐of-­‐concept	
  with	
  historical/existing	
  data	
  to	
  test	
  the	
  SA’s	
  math
• Engage	
  red	
  team	
  or	
  pen	
  testing	
  if	
  available
• Evaluate	
  the	
  results:	
  Do	
  they	
  support	
  the	
  use	
  cases?
23
Case	
  Study	
  #2:	
  Every	
  Interset	
  Customer
Millions	
  of	
  events	
  
analyzed	
  with	
  
machine	
  learning
Anomalies	
  
discovered	
  by	
  
data	
  science
High	
  quality	
  
“most	
  wanted”	
  
list
By	
  analyzing	
  the	
  intersection	
  of	
  data	
  from	
  users,	
  machines,	
  files,	
  projects,	
  
servers,	
  sharing	
  behavior,	
  resource,	
  websites,	
  IP	
  Addresses	
  and	
  more
24
Lesson	
  #2:	
  Less	
  Alerts,	
  Not	
  More
• Solution	
  should	
  help	
  you	
  deal	
  with	
  less
alerts,	
  not	
  more alerts
• Solution	
  should	
  leverage	
  sound	
  statistical	
  
methods	
  to	
  reduce	
  false	
  positives	
  and	
  noise
• Should	
  allow	
  you	
  to	
  do	
  more	
  with	
  the	
  
limited	
  resources	
  you	
  have
Recommendations
Measure	
  and	
  quantify	
  the	
  amount	
  of	
  work	
  effort	
  involved	
  with	
  and	
  without	
  the	
  
Security	
  Analytics	
  system
25
Case	
  Study	
  #3:	
  Defense	
  Contractor
High	
  Probability	
  Anomalous	
  Behavior	
  Models
• Detected	
  large	
  copies	
  to	
  the	
  portable	
  hard	
  drive,	
  
at	
  an	
  unusual	
  time	
  of	
  day
• Bayesian	
  models	
  to	
  measure	
  and	
  detect	
  highly	
  
improbable	
  events
High	
  Risk	
  File	
  Models
• Detected	
  high	
  risk	
  files,	
  including	
  PowerPoints
used	
  to	
  collect	
  large	
  amounts	
  of	
  inappropriate	
  
content
• Risk	
  aggregation	
  based	
  on	
  suspicious	
  behaviors	
  
and	
  unusual	
  derivative	
  movement
26
Lesson	
  #3:	
  Automated,	
  Measured	
  Responses
• Security	
  Analytics	
  system	
  should	
  allow	
  you	
  
to	
  quantify risk,	
  not	
  just	
  a	
  binary	
  alert
• Consider	
  how	
  to	
  automate	
  responses	
  to	
  
low,	
  medium,	
  high	
  and	
  extreme	
  risk	
  
scenarios
• Where	
  does	
  security	
  analytics	
  fit	
  into	
  your	
  
existing	
  runbook?
Recommendations
• Ensure	
  the	
  Security	
  Analytics	
  system	
  has	
  the	
  ability	
  to	
  output	
  a	
  risk	
  assessment	
  
level	
  or	
  score,	
  not	
  just	
  a	
  binary	
  alert
• Ensure	
  the	
  Security	
  Analytics	
  system	
  can	
  integrate	
  with	
  downstream	
  systems
• Evaluate	
  the	
  solution	
  with	
  automated	
  response	
  systems	
  as	
  part	
  of	
  the	
  deployment
27
Case	
  Study	
  #4:	
  Healthcare	
  Records	
  and	
  Payment	
  
Processing
• Profile:	
  6.5	
  billion	
  transactions	
  annually,	
  750+	
  
customers,	
  500+	
  employees
• Team	
  of	
  7:	
  CISO,	
  1	
  security	
  architect	
  ,	
  3	
  security	
  
analysts,	
  2	
  network	
  security	
  
• Analytics	
  surfaced	
  (for	
  example)	
  an	
  employee	
  who	
  
attempted	
  to	
  move	
  “sensitive	
  data”	
  from	
  endpoint	
  to	
  
personal	
  Dropbox
• Employee	
  was	
  arrested	
  and	
  prosecuted	
  using	
  incident	
  
data
Focus	
  and	
  prioritized	
  incident	
  responses
Incident	
  alert	
  accuracy	
  increased	
  from	
  28%	
  to	
  92%
Incident	
  mitigation	
  coverage	
  doubled	
  from	
  70	
  per	
  week	
  to	
  140
28
Lesson	
  #4:	
  Meaningful	
  Metrics
• Hawthorne	
  Effect:	
  Whatever	
  gets	
  measured,	
  gets	
  optimized
Recommendations
• Define	
  meaningful	
  operational	
  metrics	
  (not	
  just	
  “false	
  
positives”)
• Build	
  a	
  process	
  for	
  measuring	
  and	
  quantifying	
  over	
  time,	
  not	
  
just	
  during	
  a	
  pilot
• Ensure	
  the	
  Security	
  Analytics	
  system	
  supports	
  a	
  feedback	
  
process	
  to	
  adjust	
  the	
  analytics	
  to	
  support	
  your	
  target	
  metrics
29
What	
  Have	
  We	
  Learned?
Lessons
• The	
  Math	
  Matters	
  – Test	
  It
• Less	
  Alerts,	
  Not	
  More
• Automated,	
  Measured	
  Responses
• Meaningful	
  Metrics
Recommendations
• Agree	
  on	
  the	
  use	
  cases	
  in	
  advance
• Evaluate	
  results	
  with	
  and	
  without	
  
security	
  analytics	
  system
• Assess	
  risk	
  level,	
  not	
  binary	
  alert
• Ensure	
  integrated	
  feedback	
  and	
  
automated	
  response	
  
©  2017  Interset  Software  Inc.  
THANK  YOU!
sjou@interset.com
eeksock

Weitere ähnliche Inhalte

Was ist angesagt?

IANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionIANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionInterset
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]Interset
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasInterset
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayInterset
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Interset
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkInterset
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
 
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...Interset
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...SaraPia5
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoescentralohioissa
 
Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Interset
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahidBigDataExpo
 
Managing Data Science | Lessons from the Field
Managing Data Science | Lessons from the Field Managing Data Science | Lessons from the Field
Managing Data Science | Lessons from the Field Domino Data Lab
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 

Was ist angesagt? (19)

IANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight SessionIANS Forum Dallas - Technology Spotlight Session
IANS Forum Dallas - Technology Spotlight Session
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the Day
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less Work
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
IANS Forum Seattle Technology Spotlight: Looking for and Finding the Inside...
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
 
Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?Webinar: Will the Real AI Please Stand Up?
Webinar: Will the Real AI Please Stand Up?
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
 
Managing Data Science | Lessons from the Field
Managing Data Science | Lessons from the Field Managing Data Science | Lessons from the Field
Managing Data Science | Lessons from the Field
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 

Ähnlich wie The Myths + Realities of Machine-Learning Cybersecurity

Data Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactData Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactDr. Sunil Kr. Pandey
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Bigdata and Hadoop with applications
Bigdata and Hadoop with applicationsBigdata and Hadoop with applications
Bigdata and Hadoop with applicationsPadma Metta
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...Edge AI and Vision Alliance
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
 
Developing practical evidence-based solutions to prevent harm in the workplace
Developing practical evidence-based solutions to prevent harm in the workplace Developing practical evidence-based solutions to prevent harm in the workplace
Developing practical evidence-based solutions to prevent harm in the workplace Australian Institute of Health & Safety
 
Data Science.pptx NEW COURICUUMN IN DATA
Data Science.pptx NEW COURICUUMN IN DATAData Science.pptx NEW COURICUUMN IN DATA
Data Science.pptx NEW COURICUUMN IN DATAjaved75
 
2016 09-19 - stephan jou - machine learning meetup v1
2016 09-19 - stephan jou - machine learning meetup v12016 09-19 - stephan jou - machine learning meetup v1
2016 09-19 - stephan jou - machine learning meetup v1Jenny Midwinter
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AIKeita Broadwater
 
How to Analyze Data (1).pptx
How to Analyze Data (1).pptxHow to Analyze Data (1).pptx
How to Analyze Data (1).pptxInfosectrain3
 
Social network architecture - Part 3. Big data - Machine learning
Social network architecture - Part 3. Big data - Machine learningSocial network architecture - Part 3. Big data - Machine learning
Social network architecture - Part 3. Big data - Machine learningPhu Luong Trong
 
The Analytics and Data Science Landscape
The Analytics and Data Science LandscapeThe Analytics and Data Science Landscape
The Analytics and Data Science LandscapePhilip Bourne
 
High Performance Data Analytics and a Java Grande Run Time
High Performance Data Analytics and a Java Grande Run TimeHigh Performance Data Analytics and a Java Grande Run Time
High Performance Data Analytics and a Java Grande Run TimeGeoffrey Fox
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesKimberley Mitchell
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteNeo4j
 
Making an impact with data science
Making an impact  with data scienceMaking an impact  with data science
Making an impact with data scienceJordan Engbers
 

Ähnlich wie The Myths + Realities of Machine-Learning Cybersecurity (20)

Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactData Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Bigdata and Hadoop with applications
Bigdata and Hadoop with applicationsBigdata and Hadoop with applications
Bigdata and Hadoop with applications
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
Big Data & DS Analytics for PAARL
Big Data & DS Analytics for PAARLBig Data & DS Analytics for PAARL
Big Data & DS Analytics for PAARL
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
Developing practical evidence-based solutions to prevent harm in the workplace
Developing practical evidence-based solutions to prevent harm in the workplace Developing practical evidence-based solutions to prevent harm in the workplace
Developing practical evidence-based solutions to prevent harm in the workplace
 
Data Science.pptx NEW COURICUUMN IN DATA
Data Science.pptx NEW COURICUUMN IN DATAData Science.pptx NEW COURICUUMN IN DATA
Data Science.pptx NEW COURICUUMN IN DATA
 
2016 09-19 - stephan jou - machine learning meetup v1
2016 09-19 - stephan jou - machine learning meetup v12016 09-19 - stephan jou - machine learning meetup v1
2016 09-19 - stephan jou - machine learning meetup v1
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AI
 
How to Analyze Data (1).pptx
How to Analyze Data (1).pptxHow to Analyze Data (1).pptx
How to Analyze Data (1).pptx
 
Social network architecture - Part 3. Big data - Machine learning
Social network architecture - Part 3. Big data - Machine learningSocial network architecture - Part 3. Big data - Machine learning
Social network architecture - Part 3. Big data - Machine learning
 
The Analytics and Data Science Landscape
The Analytics and Data Science LandscapeThe Analytics and Data Science Landscape
The Analytics and Data Science Landscape
 
High Performance Data Analytics and a Java Grande Run Time
High Performance Data Analytics and a Java Grande Run TimeHigh Performance Data Analytics and a Java Grande Run Time
High Performance Data Analytics and a Java Grande Run Time
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use Cases
 
DataScience_introduction.pdf
DataScience_introduction.pdfDataScience_introduction.pdf
DataScience_introduction.pdf
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - Keynote
 
Making an impact with data science
Making an impact  with data scienceMaking an impact  with data science
Making an impact with data science
 

Mehr von Interset

IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]Interset
 
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in CybersecurityIANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in CybersecurityInterset
 
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in CybersecurityInterset
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in CybersecurityInterset
 
Infographic: Inside Data Breaches
Infographic: Inside Data BreachesInfographic: Inside Data Breaches
Infographic: Inside Data BreachesInterset
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsInterset
 

Mehr von Interset (7)

IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum DC: Operationalizing Big Data Security [Tech Spotlight]
 
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in CybersecurityIANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum DC: Everything is a Nail! Machine Learning in Cybersecurity
 
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Charlotte: Everything is a Nail! Machine Learning in Cybersecurity
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in CybersecurityIANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
IANS Forum Seattle: Everything is a Nail! Machine Learning in Cybersecurity
 
Infographic: Inside Data Breaches
Infographic: Inside Data BreachesInfographic: Inside Data Breaches
Infographic: Inside Data Breaches
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

The Myths + Realities of Machine-Learning Cybersecurity

  • 1. ©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
  • 2. ©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. AI  Truths  and  Myths Dr.  Chase  Cunningham,   Principal  Analyst  Security  and  Risk September  28,  2017
  • 3. 3©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. Let’s  Define  AI….      Or  At  Least  Be  Real  About  It AI  (Today)=   Math,  Patterns,  Computations,  Iterations  
  • 4. 4©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. Artificial  Intelligence  As  It  Stands  Today AI  =   Data            +        Machine  Learning  +      Human  Interaction
  • 5. 5©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. What  AI  is  Not
  • 6. 6©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. Timeline  of  AI  Failures • Failure  of  machine  translation1966 • Abandonment  of  connectionism1970 • DARPA's  frustration  with  the  Speech  Understanding  Research  program  at  Carnegie  Mellon  University1971−75 • Large  decrease  in  AI  research  in  the  United  Kingdom  in  response  to  the  Lighthill report1973 • DARPA's  cutbacks  to  academic  AI  research  in  general1973−74 • Collapse  of  the  Lisp  machine  market1987 • Cancellation  of  new  spending  on  AI  by  the  Strategic  Computing  Initiative1988 • Expert  systems  slowly  reaching  the  bottom1993 • Quiet  disappearance  of  the  fifth-­generation  computer  project's  original  goals1990s
  • 7. 7©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. Watson • IBM’s  Artificial  Intelligence   computer  system • Capable  of  answering   questions  in  natural   language • Competed  against   champions  on  Jeopardy   and  won
  • 8. 8©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. Watson’s  Sources  of  Information • Encyclopedias • Dictionaries • Thesauri   • Newswire  articles • Literary  works • Databases,  taxonomies,   and  ontologies • Wikipedia  articles And  more
  • 9. 9©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. How  Watson  Works • Receives  the  clues  (questions)  as  electronic  texts • It  then  divides  these  texts  into  different  keywords  and  sentence   fragments  and  searches  for  statistically  related  phrases • Quickly  executes  thousands  of  language  analysis  algorithms   • The  more  algorithms  that  find  the  same  answer  increase  Watson’s   confidence  of  his  answer  and  it  calculates  whether  or  not  to  make  a   guess  
  • 10. 10©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. What  is  Machine  Learning? Applications  of  algorithms  that • improve  their  performance • at  some  task • with  experience
  • 11. 11©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
  • 12. 12©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. Building  Blocks  of  AI • Classification • Compare  unknown  against  larger   known  dataset • Clustering • Find  data  points  similar  in  nature • Regression • Measure  statistical  relationships   between  variables  based  on   history  or  training  set
  • 13. 13©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. Where  Companies  Want  to  Use  AI 34%  of  companies   plan/are  using  AI  to   mitigate  security  risks
  • 14. 14©  2017  FORRESTER.  REPRODUCTION  PROHIBITED.
  • 15. 15©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. What  is  Intelligence:  The  Turing  Test A machine can be described as a thinking machine if it passes the Turing Test. i.e. If a human agent is engaged in two isolated dialogues (connected by teletype say); one with a computer, and the other with another human and the human agent cannot reliably identify which dialogue is with the computer.
  • 16. FORRESTER.COM Thank  you ©  2017  FORRESTER.  REPRODUCTION  PROHIBITED. Dr.  Chase  Cunningham ccunningham@forrester.com
  • 17. Separating  Myth  from  Reality Machine  Learning  and  A.I.  in  Cybersecurity
  • 18. 18 Hey.  I’m  Stephan  Jou.  I  like  analytics. • CTO  at  Interset • Previously:  Cognos and  IBM’s  Business  Analytics  CTO   Office • Big  data  analytics,  visualization,  cloud,  predictive   analytics,  data  mining,  neural  networks,  mobile,   dashboarding and  semantic  search • M.Sc.  in  Computational  Neuroscience  and   Biomedical  Engineering,  and  a  dual  B.Sc.  in   Computer  Science  and  Human  Physiology,  all  from   the  University  of  Toronto
  • 19. 19 About  Interset At  Interset,  we  catch  bad  guys  with  math. • Data  science  and  machine  learning  on  big  data  analytics   technologies • Cover  multiple  cybersecurity  use  cases • Based  in  Ottawa,  Ontario,  Canada • Award  winning  threat  detection  platform • Successful  deployments  across  multiple  verticals • Clients  include  US  Intelligence  Communities And  a  leader  in  security  analytics.
  • 20. 20 Best  Practices  and  Real-­‐Life  Examples There  is  too  much  FUD,   confusion  and  snake  oil  out   there! How  can  we  separate myth  from  reality? Q A Construct  a  mathematical  proof  of  correctness! Best  practices,  patterns,  and  lessons   from  actual  real-­‐life  case  studies!
  • 21. 21 Case  Study  #1:  $20B  Manufacturer X 2  Engineers   stole  data 1  Year $1  Million  Spent Large  security   vendor  failed  to   find  anything   2  Weeks Easily   identified  the  2   Engineers Found  3   additional  users   stealing  data  in   North  America Found  8   additional  users   stealing  data  in   China
  • 22. 22 Lesson  #1:  The  Math  Matters  – Test  It • Too  much  snake  oil • The  math  matters  – but  the  use  case  matters   more! • Don’t  rely  on  a  smoking  gun Recommendations • Agree  on  the  use  cases  in  advance • Use  a  proof-­‐of-­‐concept  with  historical/existing  data  to  test  the  SA’s  math • Engage  red  team  or  pen  testing  if  available • Evaluate  the  results:  Do  they  support  the  use  cases?
  • 23. 23 Case  Study  #2:  Every  Interset  Customer Millions  of  events   analyzed  with   machine  learning Anomalies   discovered  by   data  science High  quality   “most  wanted”   list By  analyzing  the  intersection  of  data  from  users,  machines,  files,  projects,   servers,  sharing  behavior,  resource,  websites,  IP  Addresses  and  more
  • 24. 24 Lesson  #2:  Less  Alerts,  Not  More • Solution  should  help  you  deal  with  less alerts,  not  more alerts • Solution  should  leverage  sound  statistical   methods  to  reduce  false  positives  and  noise • Should  allow  you  to  do  more  with  the   limited  resources  you  have Recommendations Measure  and  quantify  the  amount  of  work  effort  involved  with  and  without  the   Security  Analytics  system
  • 25. 25 Case  Study  #3:  Defense  Contractor High  Probability  Anomalous  Behavior  Models • Detected  large  copies  to  the  portable  hard  drive,   at  an  unusual  time  of  day • Bayesian  models  to  measure  and  detect  highly   improbable  events High  Risk  File  Models • Detected  high  risk  files,  including  PowerPoints used  to  collect  large  amounts  of  inappropriate   content • Risk  aggregation  based  on  suspicious  behaviors   and  unusual  derivative  movement
  • 26. 26 Lesson  #3:  Automated,  Measured  Responses • Security  Analytics  system  should  allow  you   to  quantify risk,  not  just  a  binary  alert • Consider  how  to  automate  responses  to   low,  medium,  high  and  extreme  risk   scenarios • Where  does  security  analytics  fit  into  your   existing  runbook? Recommendations • Ensure  the  Security  Analytics  system  has  the  ability  to  output  a  risk  assessment   level  or  score,  not  just  a  binary  alert • Ensure  the  Security  Analytics  system  can  integrate  with  downstream  systems • Evaluate  the  solution  with  automated  response  systems  as  part  of  the  deployment
  • 27. 27 Case  Study  #4:  Healthcare  Records  and  Payment   Processing • Profile:  6.5  billion  transactions  annually,  750+   customers,  500+  employees • Team  of  7:  CISO,  1  security  architect  ,  3  security   analysts,  2  network  security   • Analytics  surfaced  (for  example)  an  employee  who   attempted  to  move  “sensitive  data”  from  endpoint  to   personal  Dropbox • Employee  was  arrested  and  prosecuted  using  incident   data Focus  and  prioritized  incident  responses Incident  alert  accuracy  increased  from  28%  to  92% Incident  mitigation  coverage  doubled  from  70  per  week  to  140
  • 28. 28 Lesson  #4:  Meaningful  Metrics • Hawthorne  Effect:  Whatever  gets  measured,  gets  optimized Recommendations • Define  meaningful  operational  metrics  (not  just  “false   positives”) • Build  a  process  for  measuring  and  quantifying  over  time,  not   just  during  a  pilot • Ensure  the  Security  Analytics  system  supports  a  feedback   process  to  adjust  the  analytics  to  support  your  target  metrics
  • 29. 29 What  Have  We  Learned? Lessons • The  Math  Matters  – Test  It • Less  Alerts,  Not  More • Automated,  Measured  Responses • Meaningful  Metrics Recommendations • Agree  on  the  use  cases  in  advance • Evaluate  results  with  and  without   security  analytics  system • Assess  risk  level,  not  binary  alert • Ensure  integrated  feedback  and   automated  response  
  • 30. ©  2017  Interset  Software  Inc.   THANK  YOU! sjou@interset.com eeksock