Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

11/5/2013
05:06 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

IT Security From The Eyes Of Data Scientists

Enterprises will increasingly employ data science experts to help drive security analytics and risk mitigation

As IT security leaders try to base more of their day-to-day decisions on statistical analysis of relevant data coming from IT infrastructure and business processes, they're running into a skills and resource gap. Often security teams have lots of specialists with deep technical knowledge of attack techniques and trends, but they frequently lack the skills to aggregate and manipulate data in order to draw meaningful conclusions from statistical trends.

As the speed and volume of security data continues to mount, so will that gap, which is why many within the industry believe that in the coming years, an IT security team will not be complete without at least one data scientist among its ranks.

"In the past, it has always been us who has been behind the game, trying to catch up with the attackers' techniques," says Dan Mitchell, product manager of data sciences for RSA, The Security Division of EMC. "I think data science gives us the opportunity to get ahead of the attackers and have them be behind for a change."

Mitchell is among a growing legion of data scientists growing active within the IT security community, and one of several that Dark Reading caught up with to get their views on the value that their colleagues bring to the table, why enterprises need to employ more, and how organizations can develop talent and embed these experts into their security practices.

The complex chain of techniques that attackers today use to infiltrate IT resources and steal data makes it absolutely critical that security teams spot trends and connect behaviors that span across IT infrastructure, user groups, and geographical locations.

In order to do that, it requires security to have experts that can manipulate data, visualize it, and draw conclusions from it. Not only that, the team needs to be able to build infrastructure to store data, normalize it, and develop modeling that can answer the burning questions security analysts have about anomalies that may indicate compromise -- and that infrastructure should preferably be designed to do it all automatically.

This is the exact kind of expertise a data scientist brings to the table, says Ram Keralapura, data scientist for Netskope, a cloud apps analytics and policy creation company, who explains that the CISO and data scientist have the opportunity to form a symbiotic relationship.

"Security officers have a very good understanding of the outcome they want and have identified their problems -- they want to know specific kinds of information about certain kinds of anomalies or activities that are happening in their enterprise, but they don't always know how to get that information," says Keralapura. "Data scientists are the right people to bridge this gap and provide the insights that these security officers need in order to make more informed decisions."

What's more, Mitchell explains that someone with his type of expertise can help break down a lot of the silos that currently exist in the security realm.

"So because the security industry has become so fractionalized in terms of specialty areas, data science offers a way to bring specific domain expertise and then combine that with things like machine learning, mathematical modeling and manipulating data to solve problems that extend across all specialties," he says. "It's really about creating the whole picture."

[How do you know if you've been breached? See Top 15 Indicators of Compromise.]

Whereas in the past a lot of the mathematical minds in security tended to gravitate toward specialties like encryption or authentication, Mitchell believes that many will be diverted into data science.

"There's so much more we can do mathematically to solve our problems," he says. "I think you're going to see more and more of that. It's a larger trend."

Many vendors have already been leading the trend of hiring and training more data scientists to develop analytics-based security products, but the role of the data scientist should also be a staple within enterprise IT security teams.

"The reason I think that businesses also have to be hiring data scientists is that in security, especially, a large component of the practice is data about your particular environment," says Michael Roytman, data scientist for Risk I/O, a vulnerability threat monitoring vendor. "A lot can be done to use that data to narrow down where you should be focusing on your security risks, and that's where an in-house data scientist plays a part."

And, says Keralapura, it really should be a full-time role. There are several big reasons for this, he says. First, in order to develop predictive models about the enterprise's specific data, data scientists need to develop long-term relationships with security experts on staff and deal with data on a day-to-day basis. Second, in order to accomplish real-time detection, they'll need to be around to help with response in real time. And, third, a full-time data scientist is crucial to helping forensics problems that could pop up at any time.

"When a problem happens, you need to look at data right away in order to identify what it was, why did it happen, how did it happen, and all of these different dimensions that need to be answered," says Keralapura. "These things keep happening all the time."

As enterprises seek out those with a data science background, there are two big skill sets they should be looking for. The most obvious is a high degree of mathematics and statistical analysis. The second is the coding chops of a hacker.

"You are going to want people that have some hacking ability to put things together quickly. A lot of it is going to be about changing the view quickly, and some developers may know how to program well in a long development cycle," says George Ng, data scientist for YarcData, a Cray company that focuses on graph analytics. "But if someone is trying to steal your data, the pattern isn't something you already have in production to look for -- it's something you develop on the fly."

Next page: The insider data scientist Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7753
PUBLISHED: 2020-10-27
All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) [DNP] via trim().
CVE-2020-27182
PUBLISHED: 2020-10-27
Multiple cross-site scripting (XSS) vulnerabilities in konzept-ix publiXone before 2020.015 allow remote attackers to inject arbitrary JavaScript or HTML via appletError.jsp, job_jacket_detail.jsp, ixedit/editor_component.jsp, or the login form.
CVE-2020-27183
PUBLISHED: 2020-10-27
A RemoteFunctions endpoint with missing access control in konzept-ix publiXone before 2020.015 allows attackers to disclose sensitive user information, send arbitrary e-mails, escalate the privileges of arbitrary user accounts, and have unspecified other impact.
CVE-2020-8956
PUBLISHED: 2020-10-27
Pulse Secure Desktop Client 9.0Rx before 9.0R5 and 9.1Rx before 9.1R4 on Windows reveals users' passwords if Save Settings is enabled.
CVE-2020-15352
PUBLISHED: 2020-10-27
An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9 allows remote authenticated admins to conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.