Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data and artificial intelligence is a major priority for the intelligence community.

During a Sept. 7 panel discussion at the Intelligence and National Security Summit in Washington, DC, directors and deputies representing five branches of the intelligence community, including the National Security Agency, FBI, Defense Intelligence Agency and the National Geospatial-Intelligence Agency, zeroed in on the need to push past proficiency in AI and cyber.

"We have to be much more data-centric, much more savvy in how we handle data," said Melissa Drisko, the Defense Intelligence Agency's deputy director. "There are secrets there that we got to find. It's how do you find those."

"As we're looking at algorithmic analysis, artificial intelligence, machine learning, we're finding the we're having to examine what the role of the human and the analyst," she said. "It's kind of scary…but what's the role, what do we look like in 10 years…and even as we try to define it does that make [the role of the analyst] obsolete."

But for a community that values the tangible, new technology carries risks that only humans can mitigate.

"The bedrock of our profession is credibility, it is trust," said National Geospatial-Intelligence Agency Director Robert Cardillo. But as the community embraces AI, "We've got to hold on to credibility or we'll lose our lifeline."

For Navy Adm. Michael Rogers, NSA director and head of US Cyber Command, embracing technology doesn't mean losing the human element, even when there's a risk.

"I don't see us abdicating everything to a machine," he said. "I see us asking ourselves 'so where does [using] this technology make sense.'"

Cyber threats and the ability to handle them were another top concern.

"The cyber domain is blurry, it intersects each other," said the principal deputy director of national intelligence, Sue Gordon, who spoke separately at the same conference.

When it comes to, cyber "we need to get our act together," Gordon said. "Ninety percent of the issue is not government owned. The private sector, it's the vectors, who are the target. But what we have is the ability to know things somewhat in advance… how do you get together in a trusted way to be able to share what you have" and protect the nation.

Ultimately, the issue comes down to privacy, she said, and balancing the public's concerns around digital privacy.
"We need to engage a conversation with the American people. The whole security and privacy is often set up as an either-or," Gordon said. "We're going to have to reframe the conversation."

FCW.com:

You Might Also Read:

Will The CIA Be Run By  Robots…?:

Intelligence-Led Policing Gets Automated:

 

« The EU Holds Its First Cyber War Game Exercise
India Cracks Down On Drones »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Cansure

Cansure

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

ADL Consulting

ADL Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. Our services include ISO27001, GDPR, Cyber Essentials and training.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.