I have started developping applications based on Mind Mapping to help professionals in the analysis of security log files.
My first example, to start with something easy, has been creating a program to analyze Endpoint Protector log files.
Here is a presentation about this issue.
I plan to create more complex applications in case they can be useful to the information security community.
I would like to get feedback about the first impressions about the possibilities of Mind Mapping in Security Visualization.