Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:06 PM
Connect Directly

IT Security From The Eyes Of Data Scientists

Enterprises will increasingly employ data science experts to help drive security analytics and risk mitigation

While it might make sense to go out and look externally for data scientists, organizations will find it is a highly competitive and still developing field. So the human resources answer may actually reside inside the business.

Mitchell says that at many organizations, it may make sense to incent existing security analysts to learn more about data science and to brush up on their mathematical techniques.

"There's a lot that companies can do to encourage their current analysts to have a more data science-oriented approach," Mitchell says, explaining that open-source education could be a big boon for those motivated in upping their game. "For example, Coursera offers entire classes in data science and machine learning and linear algebra programming. This is where I'm getting most of my education."

Security officers could also get creative in leveraging data scientists from other parts of the organization, such as the business intelligence department, says Roytman. He believes that even more important than bringing a qualified data scientist on board is effectively embedding that person into the security machinery.

"I'm just afraid of the risk of somebody hiring a data scientist and saying you guys need to drive our remediation based on our environment," he says. "And once that's deployed in practice, the guys who are doing the day-to-day remediation just don't understand how to use that data or won't use it."

He believes that one of the most effective ways organizations can start to fold a data scientist into the mix is as a justification for CISO decisions. So a CISO may have a gut feeling about something, order some exploratory analysis, and then have the statistical proof necessary to take the right course of action. It's a recipe for better results and a higher level of respect in the board room.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

2 of 2
Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-01
HCL Domino is susceptible to a lockout policy bypass vulnerability in the ID Vault service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the ID Vault service.
PUBLISHED: 2020-12-01
Privilege Escalation vulnerability in Microsoft Windows client McAfee Total Protection (MTP) prior to 16.0.29 allows local users to gain elevated privileges via careful manipulation of a folder by creating a junction link. This exploits a lack of protection through a timing issue and is only exploit...
PUBLISHED: 2020-12-01
containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim’s API socket verified that...
PUBLISHED: 2020-12-01
FusionCompute versions 6.3.0, 6.3.1, 6.5.0, 6.5.1 and 8.0.0 have a privilege escalation vulnerability. Due to improper privilege management, an attacker with common privilege may access some specific files and get the administrator privilege in the affected products. Successful exploit will cause pr...
PUBLISHED: 2020-12-01
HUAWEI nova 4 versions earlier than and SydneyM-AL00 versions earlier than have an out-of-bounds read and write vulnerability. An attacker with specific permissions crafts malformed packet with specific parameter and sends the packet to the affected prod...