SYS-CON MEDIA Authors: Liz McMillan, Elizabeth White, Yeshim Deniz, Roger Strukhoff, Jason Bloomberg

Blog Feed Post

INSA Report: Cyber Intelligence… Setting the landscape for an emerging disciple

The Intelligence and National Security Alliance (INSA) is a group of professionals bound by a common desire to enhance the national security of the United States. Members include experts who have seen the brutal realities of international affairs and have also seen the impact of sound policy on our nation’s well being. INSA is a not-for-profit, nonpartisan, private sector organization which seeks to provide a forum for thought leadership.

One of the many significant areas INSA has been contributing ideas to is the issue of Cyber Operations.  Many of INSA’s contributions to this discipline have been via a very active Cyber Council led by one of our nation’s foremost national strategic planners, Ms. Terry Roberts. She leads a team of volunteers who seek to advance issues across a broad front in the cyber domain.

Terry and the INSA staff have just released a new document which, in my opinion, makes incredible contributions to national security discussion. The document, titled “Cyber Intelligence… Setting the landscape for an emerging discipline“, is one I believe belongs in every household in America. No kidding. We need more dialog on issues like this, and we need that dialog to be based on the well reasoned assessments of people who have truly seen both the threat and our own capabilities against it, and this document does that very well.

Let me give you a feel for why I think this is a revolutionary document. One is the documents articulation of cyber threat dynamics. It is true that you can pick up any book by any security expert or any pseudo security expert and read articulations of the threat. And for the most part the experts and pseudo experts are all just borrowing from each other anyway because there are just so many ways to say “hacker or hacker group or criminal organization or nation state.”  Articulations and definitions of the threat have a place, but we have had those taxonomies for decades now and copying them from book to book is not helping us find greater awareness or insights into what we should be doing about them.

Meanwhile, the US and other governments have direct experience and information on cyber threats that cannot be released due to classification rules or the threat to ongoing operations. So the really important stuff is not being brought out to be dissected and debated and learned from.

A group like INSA must still operate in classification guidelines and the professionals there would never even come close to violating their oaths to protect. But their deep national security expertise and awareness has allowed them to add color and context to the threat in ways no other organization could possibly do. The result is an articulation of cyber threat dynamics that is important, understandable, and compelling.

Another contribution this document makes is an insightful strategic view into the costs of defense and failure to defend. This is not a simple equation, and the context provided here contributes significantly to the dialog.

The document also offers a very elegant/advanced tutorial into the role and purpose of intelligence in the cyber arena. This section and its framework holds truths which should prove to be insightful to generations of cyber intelligence professionals.

Perhaps the greatest achievement of this document, however, is its articulation of areas for further discussion and review. The items and issues captured there are in definite need of informed dialog. Which brings us back to the importance of the overall document: we need a broader swath of our citizens engaged in an informed dialog on these important cyber issues. Getting this document into the hands of every citizen in the country would be a GREAT way to do that.

So, now it is your turn citizen. Please download the document, read it, think about it and enhance your contributions to the cyber dialog underway today.

Find it here: http://www.scribd.com/doc/62196647/Insa-Cyber-Intelligence-2011
Insa Cyber Intelligence 2011

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Latest Stories
Tapping into blockchain revolution early enough translates into a substantial business competitiveness advantage. Codete comprehensively develops custom, blockchain-based business solutions, founded on the most advanced cryptographic innovations, and striking a balance point between complexity of the technologies used in quickly-changing stack building, business impact, and cost-effectiveness. Codete researches and provides business consultancy in the field of single most thrilling innovative te...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City. Our Silicon Valley 2019 schedule will showcase 200 keynotes, sessions, general sessions, power panels, and...
Growing a digital business is essential for virtually every enterprise across every industry. Large enterprises and small businesses alike are digitizing their internal and customer-facing processes and services to increase efficiency, scale their businesses, and collect meaningful data. Yet, while many companies have launched digital services to collect data, we haven’t fully tapped into the potential of data analytics—even though studies suggest that digital will be a top differentiator in yea...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
ShieldX's CEO and Founder, Ratinder Ahuja, believes that traditional security solutions are not designed to be effective in the cloud. The role of Data Loss Prevention must evolve in order to combat the challenges of changing infrastructure associated with modernized cloud environments. Ratinder will call out the notion that security processes and controls must be equally dynamic and able to adapt for the cloud. Utilizing four key factors of automation, enterprises can remediate issues and impro...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
OpsRamp is an enterprise IT operation platform provided by US-based OpsRamp, Inc. It provides SaaS services through support for increasingly complex cloud and hybrid computing environments from system operation to service management. The OpsRamp platform is a SaaS-based, multi-tenant solution that enables enterprise IT organizations and cloud service providers like JBS the flexibility and control they need to manage and monitor today's hybrid, multi-cloud infrastructure, applications, and wor...
The Master of Science in Artificial Intelligence (MSAI) provides a comprehensive framework of theory and practice in the emerging field of AI. The program delivers the foundational knowledge needed to explore both key contextual areas and complex technical applications of AI systems. Curriculum incorporates elements of data science, robotics, and machine learning-enabling you to pursue a holistic and interdisciplinary course of study while preparing for a position in AI research, operations, ...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Industry after industry is under siege as companies embrace digital transformation (DX) to disrupt existing business models and disintermediate their competitor’s customer relationships. But what do we mean by “Digital Transformation”? The coupling of granular, real-time data (e.g., smartphones, connected devices, smart appliances, wearables, mobile commerce, video surveillance) with modern technologies (e.g., cloud native apps, big data architectures, hyper-converged technologies, artificial in...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactu...