Lisa Morgan

Don't Let Outliers Sabotage Your Cybersecurity Analytics

NO RATINGS
View Comments: Newest First | Oldest First | Threaded View
Page 1 / 2   >   >>
Lyndon_Henry
User Rank
Blogger
Re: How to hold UBA?
Lyndon_Henry   3/20/2017 5:38:19 PM
NO RATINGS
..

Michelle writes

... I don't think we'll see machines work as smoothly as humans. Building something capable of processing like the human brain might be impossible.



 

The problem is that the human cognitive system has been developed through natural processes and continues to develop via those same processes. The development process is itself extremely complex. Even if AI engineers manage to "map" and replicate the original cognitive system (itself a pretty daunting task), will they succeed in fully replicating the ongoing development processes with a mechanistic analogue? 

..

impactnow
User Rank
Blogger
Re: How to hold UBA?
impactnow   3/20/2017 4:27:13 PM
NO RATINGS
I think it's safe to say everything an employee does is being tracked by their employees, badges often track physical location, and internet behavior has been tracked for years! Employees should just assume big brother is watching while in the offices or at the home office!

kq4ym
User Rank
Data Doctor
Re: How to hold UBA?
kq4ym   3/20/2017 8:59:33 AM
NO RATINGS
As noted the " trick is to balance the needs of users and the business against potential threats," and since lots of those concerns might be from an "inside" job that may be the first palce to look. But those outliers can really foul things up, not knowing just "how far" out one should be looking trying to protect themseelves from harm of those very very unlikely scenarios, yet very dangerous ones.

SethBreedlove
User Rank
Data Doctor
Re: How to hold UBA?
SethBreedlove   3/15/2017 5:19:49 PM
NO RATINGS
One thing is for certain, while computers may be able to check for strange behavior they certaintly shouldn't have any final say on who gets fired. 

I think it's also important for employees to realize that any strage behavior such as uploading docs to an external drive is being tracked.

impactnow
User Rank
Blogger
Re: How to hold UBA?
impactnow   3/15/2017 12:33:27 AM
NO RATINGS
It is interesting to look at outliers and differential behavior, but I think cyber attacks are getting more sophisticated and utilizing more uncommon methods that seem common. The attackers understand how the cyber security software works in they are trying at every turn to confuse it or capitalize on its weaknesses. I agree that the modeling and identification will need to evolve and morph consistently to keep up. The analytics involved will need to be constantly updated.

Michelle
User Rank
Data Doctor
Re: How to hold UBA?
Michelle   3/14/2017 4:08:32 PM
NO RATINGS
@SaneIT I agree, I don't think we'll see machines work as smoothly as humans. Building something capable of processing like the human brain might be impossible.

SaneIT
User Rank
Data Doctor
Re: How to hold UBA?
SaneIT   3/14/2017 10:14:22 AM
NO RATINGS
Given that social engineering is still the leading tool for cyber-attacks I agree that you need humans keeping an eye on the outliers.  I don't know if machines will ever be able to think and shift thinking the way that humans can.  Yes, they can follow decision trees but sometimes to figure out why something is happening you need to be able to jump between decision trees or skip branches along that tree to figure out what's going on.  Humans are nothing if not inventive so trying to guess what a human is doing if it doesn't fit a pre-defined model can be incredibly difficult if not impossible for machines. 

Michelle
User Rank
Data Doctor
Re: How to hold UBA?
Michelle   3/13/2017 8:47:32 PM
NO RATINGS
@Terry That certainly seems to be the case. I agree with Lyndon -- humans should be involved to handle outlier cases. I assume there will be many outliers to contend with...

tomsg
User Rank
Data Doctor
Re: How to hold UBA?
tomsg   3/13/2017 9:10:49 AM
NO RATINGS
This is obviously an area where a lot more work needs to be done and much better tools developed. You run the risk of breating more problems than you fix with tools available today.

Lyndon_Henry
User Rank
Blogger
Re: How to hold UBA?
Lyndon_Henry   3/12/2017 6:26:44 PM
NO RATINGS
..

T Sweeney writes

I'm getting the sense that even user behavior analytics tools are pretty immature... they perform some basic functions but aren't super sophisticated or easily customized.



 

"Immature" would seem a huge understatement. This seems to fall in the class of drawbacks that I've tended to call "mechanistic", as compared to human-brain-based analytical processes. (Well, duh, they're machines, right?)

I can see a big problem arising when the cybersecurity department (or consultants) implement a new screening system which they're sure will deal with "every conceivable" problem. Beware hubris. And often that's probably without even robust AI/machine learning involved ... which still has a long, long, long way to go.

If I were ensnared in this, I'd hope the robotic cybersecurity system had a trigger that would alert a human to get involved if an "outlier" anomaly is detected. And I hope that some reasonably competent human would be on duty 24/7.

..

Page 1 / 2   >   >>
Information Resources
More Blogs from Lisa Morgan
Everybody knows how important analytics is to remaining competitive. Where does your company and industry stand in terms of advanced analytics maturity?
Marketing analytics has evolved with the increase in volumes of customer data. But can this increase in data really help us get a full view of the consumers?
Cyber security continues to be an arms race as organizations race to protect against new kinds of attacks. Here's how analytics is making a difference.
There has been plenty of talk about the need for a chief analytics officer or chief data officer. But do you ever wonder what they do for a living?
Radio Show
A2 Conversations
UPCOMING
James M. Connolly
Evolution of the Data Scientist Role


3/23/2017   REGISTER   0
UPCOMING
Jessica Davis
Monetize Your Data: Turning Insights Into Action


3/29/2017   REGISTER   0
ARCHIVE
Jessica Davis
Data Analysts in Training: Meeting Tomorrow's Demand


3/8/2017  LISTEN   63
ARCHIVE
Jessica Davis
Our Bodies, Our Data: Medical Records For Sale


2/21/2017  LISTEN   63
ARCHIVE
Jessica Davis
Energy Analytics: Using Data to Find Savings


2/14/2017  LISTEN   44
ARCHIVE
Jessica Davis
Sharpen Your Analytics & Data Management Strategy


2/8/2017  LISTEN   74
ARCHIVE
Jessica Davis
Analytics: Make the Most of Data's Potential in 2017


1/19/2017  LISTEN   19
ARCHIVE
Jessica Davis
A2 Radio: Can You Trust Your Data?


12/20/2016  LISTEN   70
ARCHIVE
James M. Connolly
Retail Analytics: See Where Style Meets Statistics


12/6/2016  LISTEN   53
ARCHIVE
James M. Connolly
Why the IoT Matters to Your Business


11/29/2016  LISTEN   45
ARCHIVE
James M. Connolly
Will Data and Humans Become Friends in 2017?


11/22/2016  LISTEN   40
ARCHIVE
James M. Connolly
We Can Build Smarter Cities


10/20/2016  LISTEN   31
Information Resources
Quick Poll
Quick Poll
About Us  |  Contact Us  |  Help  |  Register  |  Twitter  |  Facebook  |  RSS