Garbage in, garbage out big data analytics models demonstrate that people are just as important as data sets and algorithms If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect. Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, The New York Times, Princeton, etc. The lowest percentage gave Mrs. Clinton roughly a 65 percent chance of winning on November 8. So, what happened? Every database jockey recognizes the old maxim of garbage in/garbage out. In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data. Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas. The result? A stunning election result and lots of eggs on Ivy League elitist faces.+ Also on Network World: Is Trump’s unexpected victory a failure for big data? Not really +Now, I know what you are thinking: What does this have to do with cybersecurity? Well, you can’t get through a cybersecurity meeting in Santa Clara, California, without some fat cat VC or startup crowing about security analytics based upon artificial intelligence, machine learning, neural networks or some other big data analytics model. Yup, my head is spinning with buzz words such as supervised and unsupervised machine learning, entropy and information gain, decision trees, etc. Mind you, very few people understand this stuff, but everyone is talking about it. And if you think the machine learning rhetoric is insane today, wait until the cacophony at the RSA Conference buzzathon in February. Here’s where the election results and security analytics intersect: The accuracy of these models depends upon people, not technology. Regarding the election, the people building the data models did not understand the electorate making the models flawed by design. I’m afraid cybersecurity data models may suffer the same fate because there simply aren’t enough experienced cybersecurity professionals available with situational awareness and data expertise to make all of these models robust.Here are a few data points I use to support my conclusion: Per ESG research, 46 percent of organizations claim they have a problematic shortage of cybersecurity skills today. Similarly, a recently published research report from ESG and the Information Systems Security Association (ISSA) indicates that 55 percent of cybersecurity professionals believe the cybersecurity skills shortage is far worse than most people think. The ESG/ISSA research report also indicates that 56 percent of cybersecurity professionals believe the level of cybersecurity training they receive from their employers is inadequate for keeping up with the threat landscape.The ESG/ISSA research also reveals that 33 percent of cybersecurity professionals categorize security analysis and investigations as the area where their organization has its biggest cybersecurity skills shortage. In aggregate, this data concludes that there is an acute shortage of cybersecurity talent and an even more acute shortage of cybersecurity analytics talent. New types of cybersecurity analytics depend upon two types of people: data scientists who can build the models and cybersecurity subject matter experts who can feed the models with the right assumptions, data and situational awareness. Unfortunately, the ESG/ISSA data demonstrates that there just aren’t enough of these latter folks to go around. Given this situation, I have two words for CISOs looking to invest in advanced cybersecurity analytics: Caveat Emptor. The technology may dazzle, but as the election results proved, we’ll all get bamboozled when the models are built with the wrong assumptions and flawed data. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe