Главная
Study mode:
on
1
Intro
2
The WOPR
3
Raphael Marty
4
Discovery Phase
5
Research Phase
6
User Personas
7
User Perspectives
8
Design Requirements
9
Concept Phase
10
Prototype Phase
Description:
Explore data visualization techniques in cybersecurity through this conference talk that challenges traditional approaches. Delve into the evolution of security data representation, from the iconic WOPR (War Operation Plan Response) computer to modern methodologies. Learn about the comprehensive process of creating effective visualizations, including discovery, research, user persona development, and design requirements. Gain insights into the concept and prototype phases, understanding how to craft visual representations that enhance security analysis and decision-making. Discover how to leverage user perspectives and design principles to create impactful security visualizations that go beyond conventional methods.

Data Visualization in Security - Still Home of the WOPR?

BSidesLV
Add to list
00:00
-01:18