{"id":203204,"date":"2017-07-03T08:16:25","date_gmt":"2017-07-03T12:16:25","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-emergence-of-virtual-reality-and-augmented-reality-in-the-security-operations-center-security-intelligence-blog\/"},"modified":"2017-07-03T08:16:25","modified_gmt":"2017-07-03T12:16:25","slug":"the-emergence-of-virtual-reality-and-augmented-reality-in-the-security-operations-center-security-intelligence-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/virtual-reality\/the-emergence-of-virtual-reality-and-augmented-reality-in-the-security-operations-center-security-intelligence-blog\/","title":{"rendered":"The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center &#8211; Security Intelligence (blog)"},"content":{"rendered":"<p><p>    Organizations are increasingly clustering their skills and    capabilities into security operations centers (SOCs). An SOC is    a focused facility where security specialists monitor, assess    and defend against computer security issues. Introducing    virtual reality (VR) and augmented reality (AR) technology into    this environment can enhance the teams performance.  <\/p>\n<p>    An organization wishing to invest in an SOC typically has two    options to accomplish this goal:  <\/p>\n<p>    But with a global skills gap translating to an    estimated 1.8 million unfilled cybersecurity positions by 2022,    it is critical to find better ways to detect and identify    threats and vulnerabilities. Reducing complexity, too, will    allow an organizations security staff to be as effective as    possible. SOCs help organizations, chief information security    officers (CISOs) and their staffs to successfully analyze,    defend and complete their cybersecurity missions. In their    current model, however, these security facilities are costly,    and difficult to set up and maintain.  <\/p>\n<p>    SOCs need for a central geographic site presents a number of    technical, logistical and operational challenges. The    traditional SOC model also calls for substantial investments in    hardware, physical footprint, visual isolation and technical    configuration, among other things. For example, SOCs need    numerous digital displays and sophisticated servers to    facilitate the visualization of security monitoring and the    gathering of data via security information and event management    (SIEM) software.  <\/p>\n<p>    VR and AR technologies can help solve some of the problems    todays SOCs face, enabling organizations to rapidly mobilize    and scale their centers without excessive monetary and resource    investment.  <\/p>\n<p>    Using VR as a platform for security staff allows them to take    their SOC anywhere, untethering them from the fixed physical    infrastructure and geographic location of a traditional center.    Taking action from the virtual world by sending serverside    requests from the VR user interface to limit services, run    scans and develop systemwide alerts creates an end-to-end story    for users where monitoring and control exist in the same    virtual space.  <\/p>\n<p>    In a VR environment, the frontline SOC level-one security    analyst role can be performed with the appropriately scoped    visual cues, without requiring a seasoned security    professionals depth of knowledge. This allows organizations to    adequately staff their SOCs in the face of significant    employment competition and high global demand for cybersecurity    roles. The addition of services, such as     Watson for Cyber Security, further enhances this    capability.  <\/p>\n<p>    Undoubtedly, VR represents a paradigm shift in how monitoring    solutions are designed, created and employed. VR has    extraordinary benefits to an organizations SOC: It can help    reduce costs associated with maintaining the SOC, enable the    monitoring of more varied sources and facilitate the analysis    of more endpoints. Additionally, the virtual environment can    raise internal awareness among the day-to-day requirements of    SOC operators, helping them to identify areas of investment for    the ongoing maintenance of the defenders ecosystem.  <\/p>\n<p>    With its visual impact, the VR experience offers a unique    medium through which business-level stakeholders can be kept    abreast of their organizations security ecosystem and posture,    improving both their understanding and their ability to ask    questions.  <\/p>\n<p>    With the addition of augmented intelligence and interaction in    the form of technologies like threat intelligence, the SOC    operator can issue voice commands to interrogate specific    network data without needing to exit their virtual environment.    This immersive VR space enables security professionals to    maximize their time spent observing network activity and    mitigating potential threats, in turn providing greater context    and consumable intelligence for the C-suite.  <\/p>\n<p>    Visualization is central to understanding security ecosystem    data and organizational key performance indicators, as well as    to building internal awareness of an organizations security    status in a top-down, consumable way.  <\/p>\n<p>    An organization cannot react to a cyberthreat that is not    manifested in the data  nor one that is hidden in even more    data or else is delayed. The Ponemon Institutes malware report    suggested that the greatest barrier to remediating advanced    threat attacks is a lack of visibility of threat activity    across the enterprise.  <\/p>\n<p>    Security analysts are drowning in data, and it is difficult for    them to interpret this information when receiving so many    security alerts  many of them red  on a daily basis. More    dashboards and more displays are not the answer. But a VR    solution can help effectively identify potential threats and    vulnerabilities as they emerge for oversight by the blue    (defensive) team.  <\/p>\n<p>    Our cybersecurity team at IBM Ireland has recently developed a    prototype VR solution integrating with the IBM QRadar SIEM product. We built this prototype    with the Unity Technologies framework, a cross-platform game    engine that can be used to create highly interactive    three-dimensional spaces. In our implementation, the Unity    framework was combined with the IBM QRadar SIEM application    program interfaces (APIs) to transform the JavaScript Object    Notation data feed from the application into the form of a 3-D    galaxy inside a VR-capable device (Oculus Rift, for example).  <\/p>\n<p>    This VR-integrated IBM QRadar app immerses the security    professional (blue operator) in a virtual 3-D space featuring    planets, stars, nebulae, comets and manmade structures. Each    spatial visual element represents the various nodes of the    operators IT ecosystem from the SIEM solution, including    individual IPs, databases, public customer-facing endpoints, or    any other facet of the network or service they may wish to    monitor. Threats and warnings appear as solar flares, supernova    and other visual cues, clearly alerting the observer to any    potentially troublesome cybersecurity activity inside their    infrastructure scope.  <\/p>\n<p>    Through our experience in gamification for security education    and cyber skill development, we observed the enormous value in    using visual metaphors to explain complex issues. Based on this    experience, we adopted a visual metaphor approach in our VR    prototype.  <\/p>\n<p>    The VR experience has the potential to further evolve into    the AR space, where digital contexts and    layers can be presented on top of the real-world SOC itself.  <\/p>\n<p>    With AR, any operator at any level can superimpose views on the    fly to augment the data presented, improving forecasting,    analysis and decision-making. AR is also a prevalent emerging    technology with significant advantages over the VR prototype we    built. In the case of the SOC, AR could enable a personalized    and customizable second virtual screen (or view) for each    operator.  <\/p>\n<p>    While the main drawback of a VR-powered SOC is that it pulls    the security professional out of the familiar physical world    and into a virtual environment, an AR solution allows the SOC    operator to be in two worlds at once.  <\/p>\n<p>    A well-thought-out, configured and deployed VR SIEM integration    toolkit will become an asset for organizations creating or    maintaining future SOCs. Although the prototype described above    is a virtual solution, enterprise security products will, in    time, integrate effectively with a complementary AR utility to    facilitate greater engagement, interaction and success inside    SOCs.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/securityintelligence.com\/the-emergence-of-virtual-reality-and-augmented-reality-in-the-security-operations-center\/\" title=\"The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center - Security Intelligence (blog)\">The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center - Security Intelligence (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where security specialists monitor, assess and defend against computer security issues.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/virtual-reality\/the-emergence-of-virtual-reality-and-augmented-reality-in-the-security-operations-center-security-intelligence-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187744],"tags":[],"class_list":["post-203204","post","type-post","status-publish","format-standard","hentry","category-virtual-reality"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/203204"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=203204"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/203204\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=203204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=203204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=203204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}