

Some SOC operators do the same thing for clients, using the maps to visualise attack types and try to answer customer questions. The concept is smart, as the visuals and datatypes on display can create discussion points on attack types, methods and threat actors. Most are just a subset of recorded attacks or a playback of sanitized packet captures.īut don’t discount how useful the eye candy factor can be: one security professional said he uses them to get high schoolers interested in the security industry. The common misconception with cyber-attack maps is that the data is live, or real-time. “If I found one that’d add value, we’d use it,” one security executive said on Twitter.

In fact, most of the professionals said they’ve used them, but other than “performance art,” there isn’t any real value in them. Some of the professionals CSO spoke with said they’ll pop one of the maps up on a screen in the SOC (Security Operations Center) if they know a client is coming in, but only because of the eye candy factor. In fact, one map actually uses these sounds to an amusing effect. They call them “pew pew” maps, mimicking a child-like sound to represent gunfire when playing with toys. While the maps themselves are mostly eye catching with limited context, there are some creative ways they can be used.Įntrenched security professionals view cyber-attack maps with a somewhat jaded eye. CSO looked at eight of the web’s most popular cyber-attack maps.

When it comes to security, context is key.
