Day Two – Analytics and Cognitive
Hey, everybody. Morgan Wright here, your favorite person obviously because you’re listening to this. You don’t have to be quiet, guys, this is live from the floor. Say hi to Natasha. There you go, Natasha. Say hi. Say hi to everybody. Hi. There you go. Okay.
Anyway, guys. It’s Day 2 World of Watson. You guys know me. I’m much better on video. I’m not going to sit here and do a bunch of typing. A couple interesting things. First of all, thank you to IBM for inviting me to come down here as one of their influencers, their, quote, social VIPs. Boy, do I have them fooled.
I think there’s some very interesting stuff that’s going on down here that I want you guys to know about, and really it’s the advent … Law enforcement, public safety is losing the war on data. There is so much out there we’re not using it correctly, we’re not analyzing it correctly. We’re not putting to its full value.
The Cool Stuff
Here’s a couple of things I’ve learned, and actually I saw some really cool stuff yesterday. One of the biggest things coming out right now is the use of body worn cameras. Body worn cameras take a lot of video, things that you have to manage, things that you have to analyze. The holy grail has always been how do I redact faces out of that that don’t apply to the case that I’m in? Back when I was a detective, we had to be very careful. We couldn’t disclose names. If you were interviewing a minor, you wanted to make sure we don’t disclose the minor’s identity. Police reports had to be very careful about that.
Now you have videos, so now I have people in there that are not involved in the case. How do I do this? It was very interesting watching a body worn camera that walked through Times Square, New York, capturing everything. Identifying faces, even on billboards. It knew it was a face, and being able to target those things. Now when you come back and I’m looking for a specific person, now I can target that face. Now I can have the video, the analytics, go through and find that face and then by exclusion remove everything else from that frame or blur the faces because it knows where all the faces are. It was really cool stuff.
Some of the incident, and from a cyber security standpoint, a guy named [Bob Stazio 00:01:49] with IBM talked about some of the neat tools that they have. It’s taking the IBM analysts notebook, the I2 analysts notebook, and being able to drill down on anomalous activity. We know that anomalous activity is going to be extremely important to detect.
Finding The Needle
For example, Friday, those large distributed denial of service attacks, the DDOS attacks, happened because we saw an unusual amount of traffic coming from, quote, smart devices, which are actually dumb devices, stupid devices that shouldn’t be allowed to do this. Yet, these things were compromised. If I start to see traffic coming, we now can apply analytics and start saying, can I predict that an attack is going to happen? If so, can I also predict the best way to mitigate it? Can I start bringing in information to see have I got machines inside my environment?
Let’s say you’re a company or even a government that has 10,000 machines inside your environment. Which five, or which ten are actually infected with ransom-ware, or infected with spyware, or infected with some kind of malware that shouldn’t be in there? It’s that ability to drill down and look for anomalous behavior.
One of the big key takeaways, too, and this is something I’ve tried to change the thinking around is, people start talking about looking for the needle in the haystack, so they spend all the time making the haystack smaller. It’s actually a waste of time. Complete waste of time. What they ought to be doing is using a bigger magnet. In analytics, the cognitive technology allows you to start pulling that bigger magnet out. Now when you see some of the amazing things that Watson does, that’s why it’s called World of Watson, now you start taking the analytics combined with the cognitive technology. Pretty soon what you start doing is that it’s the swarm theory of intelligence. Together we are smarter than we are individually. I can now take the learnings of 1000 people and add to them, but then get the benefits of those thousand engineers or those thousand law enforcement officers.
Some really good things, too, about emergency operations. About how we change the face using web based clients, using mobile clients to see those types of things. I’m pretty excited about some of the things I’ve seen down here already. This will be turned into a written transcript, so don’t worry, folks.
Again, you can always find me. Identitysecurity.com. MorganWright.us or @MorganWright_US if you can’t find me, you are not trying hard enough and you probably ought to be kicked off the internet, which would probably happen because most of you have poor security because you don’t take my courses. Until next time, I’ll do an update later today, but I just wanted to get out a quick update right now.
Natasha, say bye to everybody. Say bye to everybody. There you go. Natasha says bye. All right. She’s my handler. If I do bad things, she whacks me upside the head.
Until later today, Morgan Wright. You guys stay safe out there.