Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data and artificial intelligence is a major priority for the intelligence community.

During a Sept. 7 panel discussion at the Intelligence and National Security Summit in Washington, DC, directors and deputies representing five branches of the intelligence community, including the National Security Agency, FBI, Defense Intelligence Agency and the National Geospatial-Intelligence Agency, zeroed in on the need to push past proficiency in AI and cyber.

"We have to be much more data-centric, much more savvy in how we handle data," said Melissa Drisko, the Defense Intelligence Agency's deputy director. "There are secrets there that we got to find. It's how do you find those."

"As we're looking at algorithmic analysis, artificial intelligence, machine learning, we're finding the we're having to examine what the role of the human and the analyst," she said. "It's kind of scary…but what's the role, what do we look like in 10 years…and even as we try to define it does that make [the role of the analyst] obsolete."

But for a community that values the tangible, new technology carries risks that only humans can mitigate.

"The bedrock of our profession is credibility, it is trust," said National Geospatial-Intelligence Agency Director Robert Cardillo. But as the community embraces AI, "We've got to hold on to credibility or we'll lose our lifeline."

For Navy Adm. Michael Rogers, NSA director and head of US Cyber Command, embracing technology doesn't mean losing the human element, even when there's a risk.

"I don't see us abdicating everything to a machine," he said. "I see us asking ourselves 'so where does [using] this technology make sense.'"

Cyber threats and the ability to handle them were another top concern.

"The cyber domain is blurry, it intersects each other," said the principal deputy director of national intelligence, Sue Gordon, who spoke separately at the same conference.

When it comes to, cyber "we need to get our act together," Gordon said. "Ninety percent of the issue is not government owned. The private sector, it's the vectors, who are the target. But what we have is the ability to know things somewhat in advance… how do you get together in a trusted way to be able to share what you have" and protect the nation.

Ultimately, the issue comes down to privacy, she said, and balancing the public's concerns around digital privacy.
"We need to engage a conversation with the American people. The whole security and privacy is often set up as an either-or," Gordon said. "We're going to have to reframe the conversation."

FCW.com:

You Might Also Read:

Will The CIA Be Run By  Robots…?:

Intelligence-Led Policing Gets Automated:

 

« The EU Holds Its First Cyber War Game Exercise
India Cracks Down On Drones »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

BTWorks

BTWorks

BTWorks provides identity management and anti-phishing / smishing solutions for web and mobile apps.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

EasyDMARC

EasyDMARC

EasyDMARC deliver the most comprehensive product for anyone who strives to build the most secure possible defence system for their email ecosystem.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.