Data Science for Cyber Security? Challenges and Opportunities from FloCon 2017

January 10, 2017

Advocacy, Methods, Research, Tech Insight

Blogging from FloCon cyber security conference in San Diego #FloCon17

Although not a morning person by nature, the early 7 am kick-off session was quite painless as I am still jet lagged on Amsterdam time (+9 hours, making this an easy 4pm session!).

While I was aware of a range of Linux-based open source tools for cyber security at a high level, here at the FloCon 2017 conference in San Diego I am conducting a rewarding deep dive guided by experts in the field.

Am impressed with the power and depth of the open source Linux tool cyber security ecosystem.  See many benefits to leveraging the tools to produce data for advanced analytics / data science: pattern analysis, anomaly detection, data mining, machine learning, predictive models, optimization…

Cyber security data science often suffers a lack of data to analyze for a variety of reasons, access being a big one.  Understandably many companies are quite careful in providing access to the inner workings of the inner sanctum.

Yet, it is often shocking how little insight many organizations have into what is on and what is occurring on their own network.  This is not the status quo – the problem is expanding with the proliferation of network complexity, BYOD, diverse access mechanisms, IoT, and VMs and containers.

As such, data science for cyber security is not only a growing trend, it is an essential need.  The future of network security requires close collaboration between security/networking experts and data scientists.   Where traditional methods and tools are falling short, there is great hope in uniting advanced data analytics and network security data streams to produce deep insights.

This week I am in heaven conducting a deep dive on the variety of Linux-based cyber security tools available to extract valuable data on network dynamics.  Some examples from today:

For those interested in focused background to join in, I can recommend the following O’Reilly book for starters: “Network Security Through Data Analysis”  https://lnkd.in/gu3X3H4

network_security

About SARK7

Scott Allen Mongeau (SARK7) is an INFORMS Certified Analytics Professional (CAP) and a Data Scientist in the Cybersecurity business unit at SAS Institute. Scott has over 20 years of experience in project-focused analytics functions in a range of industries, including IT, biotech, pharma, materials, insurance, law enforcement, financial services, and start-ups. Scott is a part-time PhD (ABD) researcher at Nyenrode Business University. He holds a Global Executive MBA (OneMBA) and Masters in Financial Management from Erasmus Rotterdam School of Management (RSM). He has a Certificate in Finance from University of California at Berkeley Extension, a MA in Communication from the University of Texas at Austin, and a Graduate Degree (GD) in Applied Information Systems Management from the Royal Melbourne Institute of Technology (RMIT). He holds a BPhil from Miami University of Ohio. Having lived and worked in a number of countries, Scott is a dual American (native) and Dutch citizen. He may be contacted at: webmaster@sark7.com All posts are copyright © 2015 SARK7 All external materials utilized imply no ownership rights and are presented purely for educational purposes.

View all posts by SARK7

Subscribe

Subscribe to our RSS feed and social profiles to receive updates.

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: