SYS-CON MEDIA Authors: Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz

Blog Feed Post

INSA Report: Cyber Intelligence… Setting the landscape for an emerging disciple

The Intelligence and National Security Alliance (INSA) is a group of professionals bound by a common desire to enhance the national security of the United States. Members include experts who have seen the brutal realities of international affairs and have also seen the impact of sound policy on our nation’s well being. INSA is a not-for-profit, nonpartisan, private sector organization which seeks to provide a forum for thought leadership.

One of the many significant areas INSA has been contributing ideas to is the issue of Cyber Operations.  Many of INSA’s contributions to this discipline have been via a very active Cyber Council led by one of our nation’s foremost national strategic planners, Ms. Terry Roberts. She leads a team of volunteers who seek to advance issues across a broad front in the cyber domain.

Terry and the INSA staff have just released a new document which, in my opinion, makes incredible contributions to national security discussion. The document, titled “Cyber Intelligence… Setting the landscape for an emerging discipline“, is one I believe belongs in every household in America. No kidding. We need more dialog on issues like this, and we need that dialog to be based on the well reasoned assessments of people who have truly seen both the threat and our own capabilities against it, and this document does that very well.

Let me give you a feel for why I think this is a revolutionary document. One is the documents articulation of cyber threat dynamics. It is true that you can pick up any book by any security expert or any pseudo security expert and read articulations of the threat. And for the most part the experts and pseudo experts are all just borrowing from each other anyway because there are just so many ways to say “hacker or hacker group or criminal organization or nation state.”  Articulations and definitions of the threat have a place, but we have had those taxonomies for decades now and copying them from book to book is not helping us find greater awareness or insights into what we should be doing about them.

Meanwhile, the US and other governments have direct experience and information on cyber threats that cannot be released due to classification rules or the threat to ongoing operations. So the really important stuff is not being brought out to be dissected and debated and learned from.

A group like INSA must still operate in classification guidelines and the professionals there would never even come close to violating their oaths to protect. But their deep national security expertise and awareness has allowed them to add color and context to the threat in ways no other organization could possibly do. The result is an articulation of cyber threat dynamics that is important, understandable, and compelling.

Another contribution this document makes is an insightful strategic view into the costs of defense and failure to defend. This is not a simple equation, and the context provided here contributes significantly to the dialog.

The document also offers a very elegant/advanced tutorial into the role and purpose of intelligence in the cyber arena. This section and its framework holds truths which should prove to be insightful to generations of cyber intelligence professionals.

Perhaps the greatest achievement of this document, however, is its articulation of areas for further discussion and review. The items and issues captured there are in definite need of informed dialog. Which brings us back to the importance of the overall document: we need a broader swath of our citizens engaged in an informed dialog on these important cyber issues. Getting this document into the hands of every citizen in the country would be a GREAT way to do that.

So, now it is your turn citizen. Please download the document, read it, think about it and enhance your contributions to the cyber dialog underway today.

Find it here: http://www.scribd.com/doc/62196647/Insa-Cyber-Intelligence-2011
Insa Cyber Intelligence 2011

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Latest Stories
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
Serverless applications increase developer productivity and time to market, by freeing engineers from spending time on infrastructure provisioning, configuration and management. Serverless also simplifies Operations and reduces cost - as the Kubernetes container infrastructure required to run these applications is automatically spun up and scaled precisely with the workload, to optimally handle all runtime requests. Recent advances in open source technology now allow organizations to run Serv...
Docker is sweeping across startups and enterprises alike, changing the way we build and ship applications. It's the most prominent and widely known software container platform, and it's particularly useful for eliminating common challenges when collaborating on code (like the "it works on my machine" phenomenon that most devs know all too well). With Docker, you can run and manage apps side-by-side - in isolated containers - resulting in better compute density. It's something that many developer...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
The KCSP program is a pre-qualified tier of vetted service providers that offer Kubernetes support, consulting, professional services and training for organizations embarking on their Kubernetes journey. The KCSP program ensures that enterprises get the support they're looking for to roll out new applications more quickly and more efficiently than before, while feeling secure that there's a trusted and vetted partner that's available to support their production and operational needs.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rathe...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
xMatters helps enterprises prevent, manage and resolve IT incidents. xMatters industry-leading Service Availability platform prevents IT issues from becoming big business problems. Large enterprises, small workgroups, and innovative DevOps teams rely on its proactive issue resolution service to maintain operational visibility and control in today's highly-fragmented IT environment. xMatters provides toolchain integrations to hundreds of IT management, security and DevOps tools. xMatters is the ...
With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices has skyrocketed among dev teams looking to innovate on a faster release cycle. This has enabled teams to finally realize their DevOps goals to ship and iterate quickly in a continuous delivery model. Why containers are growing in popularity is no surprise — they’re extremely easy to spin up or down, but come with an unforeseen issue. However, without the right foresight, DevOps and IT teams may lo...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...