SYS-CON MEDIA Authors: Liz McMillan, Zakia Bouachraoui, Elizabeth White, William Schmarzo, Dana Gardner

Blog Feed Post

INSA Report: Cyber Intelligence… Setting the landscape for an emerging disciple

The Intelligence and National Security Alliance (INSA) is a group of professionals bound by a common desire to enhance the national security of the United States. Members include experts who have seen the brutal realities of international affairs and have also seen the impact of sound policy on our nation’s well being. INSA is a not-for-profit, nonpartisan, private sector organization which seeks to provide a forum for thought leadership.

One of the many significant areas INSA has been contributing ideas to is the issue of Cyber Operations.  Many of INSA’s contributions to this discipline have been via a very active Cyber Council led by one of our nation’s foremost national strategic planners, Ms. Terry Roberts. She leads a team of volunteers who seek to advance issues across a broad front in the cyber domain.

Terry and the INSA staff have just released a new document which, in my opinion, makes incredible contributions to national security discussion. The document, titled “Cyber Intelligence… Setting the landscape for an emerging discipline“, is one I believe belongs in every household in America. No kidding. We need more dialog on issues like this, and we need that dialog to be based on the well reasoned assessments of people who have truly seen both the threat and our own capabilities against it, and this document does that very well.

Let me give you a feel for why I think this is a revolutionary document. One is the documents articulation of cyber threat dynamics. It is true that you can pick up any book by any security expert or any pseudo security expert and read articulations of the threat. And for the most part the experts and pseudo experts are all just borrowing from each other anyway because there are just so many ways to say “hacker or hacker group or criminal organization or nation state.”  Articulations and definitions of the threat have a place, but we have had those taxonomies for decades now and copying them from book to book is not helping us find greater awareness or insights into what we should be doing about them.

Meanwhile, the US and other governments have direct experience and information on cyber threats that cannot be released due to classification rules or the threat to ongoing operations. So the really important stuff is not being brought out to be dissected and debated and learned from.

A group like INSA must still operate in classification guidelines and the professionals there would never even come close to violating their oaths to protect. But their deep national security expertise and awareness has allowed them to add color and context to the threat in ways no other organization could possibly do. The result is an articulation of cyber threat dynamics that is important, understandable, and compelling.

Another contribution this document makes is an insightful strategic view into the costs of defense and failure to defend. This is not a simple equation, and the context provided here contributes significantly to the dialog.

The document also offers a very elegant/advanced tutorial into the role and purpose of intelligence in the cyber arena. This section and its framework holds truths which should prove to be insightful to generations of cyber intelligence professionals.

Perhaps the greatest achievement of this document, however, is its articulation of areas for further discussion and review. The items and issues captured there are in definite need of informed dialog. Which brings us back to the importance of the overall document: we need a broader swath of our citizens engaged in an informed dialog on these important cyber issues. Getting this document into the hands of every citizen in the country would be a GREAT way to do that.

So, now it is your turn citizen. Please download the document, read it, think about it and enhance your contributions to the cyber dialog underway today.

Find it here: http://www.scribd.com/doc/62196647/Insa-Cyber-Intelligence-2011
Insa Cyber Intelligence 2011

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Latest Stories
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes. We are offering early bird savings...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups. As a result, many firms employ new business models that place enormous importa...
Updating DevOps to the latest production data slows down your development cycle. Probably it is due to slow, inefficient conventional data management practices to copy data between different developer and test environment. This problem doesn't scale as teams are adopting faster software release cycles. In this session, Dhiraj Sehgal in Product and Solution at Delphix, will talk about DevOps and cloud-focused strategies to update hundreds of developer and test copies with updates from a master...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history. Unfortunately, there is no single deployment model that solves all of your business goals. You need to maintain the fl...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching o...
Digital transformation is about embracing digital technologies into a company's culture to better connect with its customers, automate processes, create better tools, enter new markets, etc. Such a transformation requires continuous orchestration across teams and an environment based on open collaboration and daily experiments. In his session at 21st Cloud Expo, Alex Casalboni, Technical (Cloud) Evangelist at Cloud Academy, explored and discussed the most urgent unsolved challenges to achieve fu...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
DXWorldEXPO LLC announced today that Nutanix has been named "Platinum Sponsor" of CloudEXPO | DevOpsSUMMIT | DXWorldEXPO New York, which will take place November 12-13, 2018 in New York City. Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix Enterprise Cloud Platform blends web-scale engineering and consumer-grade design to natively converge server, storage, virtualization and networking into a resilient, softwar...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
Only Adobe gives everyone - from emerging artists to global brands - everything they need to design and deliver exceptional digital experiences. Adobe Systems Incorporated develops, markets, and supports computer software products and technologies. The Company's products allow users to express and use information across all print and electronic media. The Company's Digital Media segment provides tools and solutions that enable individuals, small and medium businesses and enterprises to cre...