Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data and artificial intelligence is a major priority for the intelligence community.

During a Sept. 7 panel discussion at the Intelligence and National Security Summit in Washington, DC, directors and deputies representing five branches of the intelligence community, including the National Security Agency, FBI, Defense Intelligence Agency and the National Geospatial-Intelligence Agency, zeroed in on the need to push past proficiency in AI and cyber.

"We have to be much more data-centric, much more savvy in how we handle data," said Melissa Drisko, the Defense Intelligence Agency's deputy director. "There are secrets there that we got to find. It's how do you find those."

"As we're looking at algorithmic analysis, artificial intelligence, machine learning, we're finding the we're having to examine what the role of the human and the analyst," she said. "It's kind of scary…but what's the role, what do we look like in 10 years…and even as we try to define it does that make [the role of the analyst] obsolete."

But for a community that values the tangible, new technology carries risks that only humans can mitigate.

"The bedrock of our profession is credibility, it is trust," said National Geospatial-Intelligence Agency Director Robert Cardillo. But as the community embraces AI, "We've got to hold on to credibility or we'll lose our lifeline."

For Navy Adm. Michael Rogers, NSA director and head of US Cyber Command, embracing technology doesn't mean losing the human element, even when there's a risk.

"I don't see us abdicating everything to a machine," he said. "I see us asking ourselves 'so where does [using] this technology make sense.'"

Cyber threats and the ability to handle them were another top concern.

"The cyber domain is blurry, it intersects each other," said the principal deputy director of national intelligence, Sue Gordon, who spoke separately at the same conference.

When it comes to, cyber "we need to get our act together," Gordon said. "Ninety percent of the issue is not government owned. The private sector, it's the vectors, who are the target. But what we have is the ability to know things somewhat in advance… how do you get together in a trusted way to be able to share what you have" and protect the nation.

Ultimately, the issue comes down to privacy, she said, and balancing the public's concerns around digital privacy.
"We need to engage a conversation with the American people. The whole security and privacy is often set up as an either-or," Gordon said. "We're going to have to reframe the conversation."

FCW.com:

You Might Also Read:

Will The CIA Be Run By  Robots…?:

Intelligence-Led Policing Gets Automated:

 

« The EU Holds Its First Cyber War Game Exercise
India Cracks Down On Drones »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Commissum

Commissum

Commissum specialise in information assurance and security testing services.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

CyberESI

CyberESI

CyberESI is a Managed Security Service Provider providing 24x7 remote security monitoring and management of your mission-critical networks.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.

Intelligent Protection Management (IPM)

Intelligent Protection Management (IPM)

At IPM, we deliver custom technology solutions that empower businesses to thrive. With over 20 years experience, we help companies of all sizes tackle IT, Security, and Cloud.

Amiseq

Amiseq

Amiseq – Your Tech Partner delivers transformational IT Consulting Services enabling customers achieve a competitive edge.