SlideShare a Scribd company logo
Raffael Marty, CEO
Big Data Visualization
London
February, 2015
Security. Analytics. Insight.2
• Visualization
• Design Principles
• Dashboards
• SOC Dashboard
• Data Discovery and Exploration
• Data Requirements for Visualization
• Big Data Lake
Overview
Security. Analytics. Insight.3
I am Raffy - I do Viz!
IBM Research
4
Visualization
Security. Analytics. Insight.5
Why Visualization?
the stats ...
http://en.wikipedia.org/wiki/Anscombe%27s_quartet
the data...
Security. Analytics. Insight.6
Why Visualization?
http://en.wikipedia.org/wiki/Anscombe%27s_quartet
Human analyst:
• patterndetection
• remembers context
• fantasticintuition
• canpredict
Security. Analytics. Insight.7
Visualization To …
Present / Communicate Discover / Explore
Design Principles
Security. Analytics. Insight.9
Choosing Visualizations
Objective AudienceData
Security. Analytics. Insight.10
• Objective: Find attackers in the network moving laterally
• Defines data needed (netflow, sflow, …)
• maybe restrict to a network segment
• Audience: security analyst, risk team, …
• Informs how to visualize / present data
For Example - Lateral Movement
Recon Weaponize Deliver Exploit Install C2 Act
Security. Analytics. Insight.11
• Show  comparisons, contrasts,
differences
• Show  causality, mechanism,
explanation, systematic structure.
• Show  multivariate data; that is,
show more than 1 or 2 variables.
by Edward Tufte
Principals of Analytic Design
Security. Analytics. Insight.12
Show Context
42
Security. Analytics. Insight.
42
is just a number
and means nothing without
context
13
Show Context
Big Data Visualization
Security. Analytics. Insight.15
Use Numbers To Highlight Most Important Parts of Data
Numbers
Summaries
Security. Analytics. Insight.16
Additional information about
objects, such as:
• machine
• roles
• criticality
• location
• owner
• …
• user
• roles
• office location
• …
Add Context
source destination
machine and 

user context
machine role
user role
Security. Analytics. Insight.17
Traffic Flow Analysis With Context
Security. Analytics. Insight.18
http://www.scifiinterfaces.com/
• Black background
• Blue or green colors
• Glow
Aesthetics Matter
Security. Analytics. Insight.19
B O R I N G
Security. Analytics. Insight.20
Sexier
Security. Analytics. Insight.21
• Audience, audience, audience!
• Comprehensive Information (enough context)
• Highlight important data
• Use graphics when appropriate
• Good choice of graphics and design
• Aesthetically pleasing
• Enough information to decide if action is necessary
• No scrolling
• Real-time vs. batch? (Refresh-rates)
• Clear organization
Dashboard Design Principles
22
SOC Dashboards
Security. Analytics. Insight.23
Mostly Blank
Security. Analytics. Insight.24
• Disappears too quickly
• Analysts focus is on their own screens
• SOC dashboard just distracts
• Detailed information not legible
• Put the detailed dashboards on the analysts screens!
Dashboards For Discovery
Security. Analytics. Insight.25
• Provide analyst with context
• “What else is going on in the environment right now?”
• Bring Into Focus
• Turn something benign into something interesting
• Disprove
• Turn something interesting into something benign
Use SOC Dashboard For Context
Environment informs detection policies
Security. Analytics. Insight.26
Show Comparisons
Current Measure
week prior
Security. Analytics. Insight.27
• News feed summary (FS ISAC feeds, mailinglists, threat feeds)
• Monitoring twitter or IRC for certain activity / keywords
• Volumes or metrics (e.g., #firewall blocks, #IDS alerts, #failed transactions)
• Top N metrics:
• Top 10 suspicious users
• Top 10 servers connecting outbound
What To Put on Screens
Provide context to individual security alerts
http://raffy.ch/blog/2015/01/15/dashboards-in-the-security-opartions-center-soc/
28
Data Discovery &
Exploration
Security. Analytics. Insight.29
Visualize Me Lots (>1TB) of Data
Security. Analytics. Insight.30
Information Visualization Mantra
Overview Zoom / Filter Details on Demand
Principle by Ben Shneiderman
• summary / aggregation
• data mining
• signal detection (IDS, behavioral, etc.)
Security. Analytics. Insight.31
• Access to data
• Parsed data and data context
• Data architecture for central data access and fast queries
• Application of data mining (how?, what?, scalable, …)
• Visualization tools that support
• Complex visual types (||-coordinates, treemaps, 

heat maps, link graphs)
• Linked views
• Data mining (clustering, …)
• Collaboration, information sharing
• Visual analytics workflow
Visualization Challenges
Big Data Lake
Security. Analytics. Insight.33
• One central location to store all cyber security data
• “Data collected only once and third party software leveraging it”
• Scalability and interoperability
• More than deploying an off the shelf product from a vendor
• Data use influences both data formats and technologies to store the data
• search, analytics, relationships, and distributed processing
• correlation, and statistical summarization
• What to do with Context? Enrich or join?
• Hard problems:
• Parsing: can you re-parse? Common naming scheme!
• Data store capabilities (search, analytics, distributed processing, etc.)
• Access to data: SQL (even in Hadoop context), how can products access the data?
The Big Data Lake
Security. Analytics. Insight.34
Federated Data Access
SIEM
dispatcher
SIEM 

connector
SIEM console
Prod A
AD / LDAP
HR
…
IDS
FW
Prod B
DBs
Data Lake
Caveats:
• Dispatcher?
• Standard access to dispatcher /

products enabled
• Data lake technology?
SNMP
Security. Analytics. Insight.35
Multiple Data Stores
raw logs
key-value
structured
real-time

processing
(un)-structured data
context
SQL
s
t
o
r
a
g
e
stats
index
queue
distributed

processing
a
c
c
e
s
s
graph
Caveat:
• Need multiple types of 

data stores
Security. Analytics. Insight.36
Technologies (Example)
raw logs
key-value
(Cassandra)
columnar
(parquet)
real-time

processing
(Spark)
(un)-structured data
context
SQL
(Impala,
SparkSQL)
H
D
F
S
aggregates
index
(ES)
queue
(Kafka)
distributed

processing
(Spark)
a
c
c
e
s
s
graph
(GraphX)
Caveat:
• No out of the box
solution available
Security. Analytics. Insight.37
SIEM Integration - Log Management First
SIEM
columnar
or
search engine

or
log management
processing
SIEM 

connector
raw logs
SIEM console
SQL or search

interface
processing
filtering
H
D
F
S
e.g., PIG parsing
Security. Analytics. Insight.38
Simple SIEM Integration
raw, csv, json
flume
log data
SQL
(Impala,
with SerDe)
H
D
F
S
SIEM 

connector
SIEM
Requirement:
• SIEM connector to forward text-
based data to Flume.
SQL interface
Tableau, etc.
SIEM console
Security. Analytics. Insight.39
SIEM Integration - Advanced
SIEM
columnar
(parquet)
processing
syslog data
SQL
(Impala,
SparkSQL)
H
D
F
S
index
(ES)
queue
(Kafka)
a
c
c
e
s
s
other data
sources
SIEM 

connector
raw logs
SIEM console
SQL and search 

interface
Tableau, Kibana, etc.
requires parsing and
formatting in a SIEM
readable format (e.g., CEF)
Security. Analytics. Insight.40
What I am Working On
Data Stores Analytics Forensics Models Admin
10.9.79.109 --> 3.16.204.150
10.8.24.80 --> 192.168.148.193
10.8.50.85 --> 192.168.148.193
10.8.48.128 --> 192.168.148.193
10.9.79.6 --> 192.168.148.193
10.9.79.6
10.8.48.128
80
53
8.8.8.8
127.0.0.1
Anomalies
Decomposition
Data
Seasonal
Trend
Anomaly Details
“Hunt” ExplainVisual Search
• Big data backend
• Own visualization engine (Web-based)
• Visualization workflows
Security. Analytics. Insight.41
BlackHat Workshop
Visual Analytics -
Delivering Actionable Security
Intelligence
August 1-6 2015, Las Vegas, USA
big data | analytics | visualization
Security. Analytics. Insight.42
http://secviz.org
List: secviz.org/mailinglist
Twitter: @secviz
Share, discuss, challenge, and learn about security visualization.
Security Visualization Community
Security. Analytics. Insight.
raffael.marty@pixlcloud.com
http://slideshare.net/zrlram
http://secviz.org and @secviz
Further resources:

More Related Content

PPTX
Big data visualization
PPTX
Introduction to Ethics of Big Data
PPTX
Introduction to big data
PDF
Big Data & Analytics (Conceptual and Practical Introduction)
PDF
Data Visualization Techniques
PPTX
Data Mining
PPTX
Fraud and Risk in Big Data
PPTX
Interactive Visualization
Big data visualization
Introduction to Ethics of Big Data
Introduction to big data
Big Data & Analytics (Conceptual and Practical Introduction)
Data Visualization Techniques
Data Mining
Fraud and Risk in Big Data
Interactive Visualization

What's hot (20)

PDF
Data science presentation
PPTX
Data quality and data profiling
PDF
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
PDF
Exploratory data analysis data visualization
PDF
Introduction on Data Science
PPTX
Big data Presentation
PDF
Tools and techniques for data science
PPTX
Presentation on Big Data
PPTX
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
PDF
Data science
PPT
Big data ppt
PPTX
Exploratory data analysis with Python
PPTX
Data partitioning
PPTX
Data analytics
PPTX
Data analytics
PPTX
PPTX
Introduction of Data Science
PDF
Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...
PPTX
Data mining , Knowledge Discovery Process, Classification
PPTX
Chapter 1 big data
Data science presentation
Data quality and data profiling
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Exploratory data analysis data visualization
Introduction on Data Science
Big data Presentation
Tools and techniques for data science
Presentation on Big Data
What’s The Difference Between Structured, Semi-Structured And Unstructured Data?
Data science
Big data ppt
Exploratory data analysis with Python
Data partitioning
Data analytics
Data analytics
Introduction of Data Science
Data Analytics For Beginners | Introduction To Data Analytics | Data Analytic...
Data mining , Knowledge Discovery Process, Classification
Chapter 1 big data
Ad

Similar to Big Data Visualization (20)

PDF
Visualization in the Age of Big Data
PDF
Visualization for Security
PPTX
Delivering Security Insights with Data Analytics and Visualization
PDF
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PPTX
Dataviz For Cyber Security
PDF
2013.12.12 big data heise webcast
PDF
El contexto de la integración masiva de datos
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PPTX
Data Visualization in Big Data Analytics
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PDF
Big Data overview
PPTX
Advanced threat protection and big data
PDF
Accelerating Cyber Threat Detection With GPU
PPTX
Big Data and Security - Where are we now? (2015)
PPTX
Bigdata analytics
PPTX
Data Visualizations in Cyber Security: Still Home of the WOPR?
PDF
Security - Situational awareness
PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
PDF
The Heatmap
 - Why is Security Visualization so Hard?
Visualization in the Age of Big Data
Visualization for Security
Delivering Security Insights with Data Analytics and Visualization
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Dataviz For Cyber Security
2013.12.12 big data heise webcast
El contexto de la integración masiva de datos
Creating Your Own Threat Intel Through Hunting & Visualization
Data Visualization in Big Data Analytics
The Heatmap
 - Why is Security Visualization so Hard?
Big Data overview
Advanced threat protection and big data
Accelerating Cyber Threat Detection With GPU
Big Data and Security - Where are we now? (2015)
Bigdata analytics
Data Visualizations in Cyber Security: Still Home of the WOPR?
Security - Situational awareness
Technical track chris calvert-1 30 pm-issa conference-calvert
The Heatmap
 - Why is Security Visualization so Hard?
Ad

More from Raffael Marty (20)

PDF
Exploring the Defender's Advantage
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PPTX
How To Drive Value with Security Data
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
PDF
Understanding the "Intelligence" in AI
PDF
Security Chat 5.0
PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
PDF
AI & ML in Cyber Security - Why Algorithms Are Dangerous
PPTX
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
PDF
Security Insights at Scale
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PDF
Workshop: Big Data Visualization for Security
PDF
DAVIX - Data Analysis and Visualization Linux
PDF
Cloud - Security - Big Data
PDF
Cyber Security – How Visual Analytics Unlock Insight
PDF
AfterGlow
PDF
Supercharging Visualization with Data Mining
PDF
Security Visualization - Let's Take A Step Back
PDF
Visual Analytics and Security Intelligence
Exploring the Defender's Advantage
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
How To Drive Value with Security Data
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Artificial Intelligence – Time Bomb or The Promised Land?
Understanding the "Intelligence" in AI
Security Chat 5.0
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Security Insights at Scale
Creating Your Own Threat Intel Through Hunting & Visualization
Workshop: Big Data Visualization for Security
DAVIX - Data Analysis and Visualization Linux
Cloud - Security - Big Data
Cyber Security – How Visual Analytics Unlock Insight
AfterGlow
Supercharging Visualization with Data Mining
Security Visualization - Let's Take A Step Back
Visual Analytics and Security Intelligence

Recently uploaded (20)

PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
Global journeys: estimating international migration
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Supervised vs unsupervised machine learning algorithms
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
Global journeys: estimating international migration
Business Ppt On Nestle.pptx huunnnhhgfvu
Fluorescence-microscope_Botany_detailed content
Business Acumen Training GuidePresentation.pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Reliability_Chapter_ presentation 1221.5784
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
IB Computer Science - Internal Assessment.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
Recruitment and Placement PPT.pdfbjfibjdfbjfobj

Big Data Visualization

  • 1. Raffael Marty, CEO Big Data Visualization London February, 2015
  • 2. Security. Analytics. Insight.2 • Visualization • Design Principles • Dashboards • SOC Dashboard • Data Discovery and Exploration • Data Requirements for Visualization • Big Data Lake Overview
  • 3. Security. Analytics. Insight.3 I am Raffy - I do Viz! IBM Research
  • 5. Security. Analytics. Insight.5 Why Visualization? the stats ... http://en.wikipedia.org/wiki/Anscombe%27s_quartet the data...
  • 6. Security. Analytics. Insight.6 Why Visualization? http://en.wikipedia.org/wiki/Anscombe%27s_quartet Human analyst: • patterndetection • remembers context • fantasticintuition • canpredict
  • 7. Security. Analytics. Insight.7 Visualization To … Present / Communicate Discover / Explore
  • 9. Security. Analytics. Insight.9 Choosing Visualizations Objective AudienceData
  • 10. Security. Analytics. Insight.10 • Objective: Find attackers in the network moving laterally • Defines data needed (netflow, sflow, …) • maybe restrict to a network segment • Audience: security analyst, risk team, … • Informs how to visualize / present data For Example - Lateral Movement Recon Weaponize Deliver Exploit Install C2 Act
  • 11. Security. Analytics. Insight.11 • Show  comparisons, contrasts, differences • Show  causality, mechanism, explanation, systematic structure. • Show  multivariate data; that is, show more than 1 or 2 variables. by Edward Tufte Principals of Analytic Design
  • 13. Security. Analytics. Insight. 42 is just a number and means nothing without context 13 Show Context
  • 15. Security. Analytics. Insight.15 Use Numbers To Highlight Most Important Parts of Data Numbers Summaries
  • 16. Security. Analytics. Insight.16 Additional information about objects, such as: • machine • roles • criticality • location • owner • … • user • roles • office location • … Add Context source destination machine and 
 user context machine role user role
  • 17. Security. Analytics. Insight.17 Traffic Flow Analysis With Context
  • 18. Security. Analytics. Insight.18 http://www.scifiinterfaces.com/ • Black background • Blue or green colors • Glow Aesthetics Matter
  • 21. Security. Analytics. Insight.21 • Audience, audience, audience! • Comprehensive Information (enough context) • Highlight important data • Use graphics when appropriate • Good choice of graphics and design • Aesthetically pleasing • Enough information to decide if action is necessary • No scrolling • Real-time vs. batch? (Refresh-rates) • Clear organization Dashboard Design Principles
  • 24. Security. Analytics. Insight.24 • Disappears too quickly • Analysts focus is on their own screens • SOC dashboard just distracts • Detailed information not legible • Put the detailed dashboards on the analysts screens! Dashboards For Discovery
  • 25. Security. Analytics. Insight.25 • Provide analyst with context • “What else is going on in the environment right now?” • Bring Into Focus • Turn something benign into something interesting • Disprove • Turn something interesting into something benign Use SOC Dashboard For Context Environment informs detection policies
  • 26. Security. Analytics. Insight.26 Show Comparisons Current Measure week prior
  • 27. Security. Analytics. Insight.27 • News feed summary (FS ISAC feeds, mailinglists, threat feeds) • Monitoring twitter or IRC for certain activity / keywords • Volumes or metrics (e.g., #firewall blocks, #IDS alerts, #failed transactions) • Top N metrics: • Top 10 suspicious users • Top 10 servers connecting outbound What To Put on Screens Provide context to individual security alerts http://raffy.ch/blog/2015/01/15/dashboards-in-the-security-opartions-center-soc/
  • 30. Security. Analytics. Insight.30 Information Visualization Mantra Overview Zoom / Filter Details on Demand Principle by Ben Shneiderman • summary / aggregation • data mining • signal detection (IDS, behavioral, etc.)
  • 31. Security. Analytics. Insight.31 • Access to data • Parsed data and data context • Data architecture for central data access and fast queries • Application of data mining (how?, what?, scalable, …) • Visualization tools that support • Complex visual types (||-coordinates, treemaps, 
 heat maps, link graphs) • Linked views • Data mining (clustering, …) • Collaboration, information sharing • Visual analytics workflow Visualization Challenges
  • 33. Security. Analytics. Insight.33 • One central location to store all cyber security data • “Data collected only once and third party software leveraging it” • Scalability and interoperability • More than deploying an off the shelf product from a vendor • Data use influences both data formats and technologies to store the data • search, analytics, relationships, and distributed processing • correlation, and statistical summarization • What to do with Context? Enrich or join? • Hard problems: • Parsing: can you re-parse? Common naming scheme! • Data store capabilities (search, analytics, distributed processing, etc.) • Access to data: SQL (even in Hadoop context), how can products access the data? The Big Data Lake
  • 34. Security. Analytics. Insight.34 Federated Data Access SIEM dispatcher SIEM 
 connector SIEM console Prod A AD / LDAP HR … IDS FW Prod B DBs Data Lake Caveats: • Dispatcher? • Standard access to dispatcher /
 products enabled • Data lake technology? SNMP
  • 35. Security. Analytics. Insight.35 Multiple Data Stores raw logs key-value structured real-time
 processing (un)-structured data context SQL s t o r a g e stats index queue distributed
 processing a c c e s s graph Caveat: • Need multiple types of 
 data stores
  • 36. Security. Analytics. Insight.36 Technologies (Example) raw logs key-value (Cassandra) columnar (parquet) real-time
 processing (Spark) (un)-structured data context SQL (Impala, SparkSQL) H D F S aggregates index (ES) queue (Kafka) distributed
 processing (Spark) a c c e s s graph (GraphX) Caveat: • No out of the box solution available
  • 37. Security. Analytics. Insight.37 SIEM Integration - Log Management First SIEM columnar or search engine
 or log management processing SIEM 
 connector raw logs SIEM console SQL or search
 interface processing filtering H D F S e.g., PIG parsing
  • 38. Security. Analytics. Insight.38 Simple SIEM Integration raw, csv, json flume log data SQL (Impala, with SerDe) H D F S SIEM 
 connector SIEM Requirement: • SIEM connector to forward text- based data to Flume. SQL interface Tableau, etc. SIEM console
  • 39. Security. Analytics. Insight.39 SIEM Integration - Advanced SIEM columnar (parquet) processing syslog data SQL (Impala, SparkSQL) H D F S index (ES) queue (Kafka) a c c e s s other data sources SIEM 
 connector raw logs SIEM console SQL and search 
 interface Tableau, Kibana, etc. requires parsing and formatting in a SIEM readable format (e.g., CEF)
  • 40. Security. Analytics. Insight.40 What I am Working On Data Stores Analytics Forensics Models Admin 10.9.79.109 --> 3.16.204.150 10.8.24.80 --> 192.168.148.193 10.8.50.85 --> 192.168.148.193 10.8.48.128 --> 192.168.148.193 10.9.79.6 --> 192.168.148.193 10.9.79.6 10.8.48.128 80 53 8.8.8.8 127.0.0.1 Anomalies Decomposition Data Seasonal Trend Anomaly Details “Hunt” ExplainVisual Search • Big data backend • Own visualization engine (Web-based) • Visualization workflows
  • 41. Security. Analytics. Insight.41 BlackHat Workshop Visual Analytics - Delivering Actionable Security Intelligence August 1-6 2015, Las Vegas, USA big data | analytics | visualization
  • 42. Security. Analytics. Insight.42 http://secviz.org List: secviz.org/mailinglist Twitter: @secviz Share, discuss, challenge, and learn about security visualization. Security Visualization Community