Overview
Syllabus
Intro
All right boys and girls, Story Time!
Band of Breached
Big Data Landscape
We have Limited Visibility
Increased Visibility
Cost of Failure
Can you Answer One Simple Question?
Traditional Security Measures
But what if leadership refuses to believe?
The Threats
Baselines Provide a point of Reference
Who knows what evil lurks in the hearts of men?
After some initial analysis
So we talked with the business
Evolution of Plan B
So We Drew Some Pictures
What are the metrics?
Developing Metrics
So What? The value of metrics
This is what really matters to the business
The Basics
Some Example Metrics (Business)
InfoSec Data Visualization
Internal Data Sources
Example Data Sources
InfoSec Visualization Hardware
Extraction
Transform
Software
Use Cases
Patch Priority: Nessus in a new light
Who's accessing my OWA?