Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data and artificial intelligence is a major priority for the intelligence community.

During a Sept. 7 panel discussion at the Intelligence and National Security Summit in Washington, DC, directors and deputies representing five branches of the intelligence community, including the National Security Agency, FBI, Defense Intelligence Agency and the National Geospatial-Intelligence Agency, zeroed in on the need to push past proficiency in AI and cyber.

"We have to be much more data-centric, much more savvy in how we handle data," said Melissa Drisko, the Defense Intelligence Agency's deputy director. "There are secrets there that we got to find. It's how do you find those."

"As we're looking at algorithmic analysis, artificial intelligence, machine learning, we're finding the we're having to examine what the role of the human and the analyst," she said. "It's kind of scary…but what's the role, what do we look like in 10 years…and even as we try to define it does that make [the role of the analyst] obsolete."

But for a community that values the tangible, new technology carries risks that only humans can mitigate.

"The bedrock of our profession is credibility, it is trust," said National Geospatial-Intelligence Agency Director Robert Cardillo. But as the community embraces AI, "We've got to hold on to credibility or we'll lose our lifeline."

For Navy Adm. Michael Rogers, NSA director and head of US Cyber Command, embracing technology doesn't mean losing the human element, even when there's a risk.

"I don't see us abdicating everything to a machine," he said. "I see us asking ourselves 'so where does [using] this technology make sense.'"

Cyber threats and the ability to handle them were another top concern.

"The cyber domain is blurry, it intersects each other," said the principal deputy director of national intelligence, Sue Gordon, who spoke separately at the same conference.

When it comes to, cyber "we need to get our act together," Gordon said. "Ninety percent of the issue is not government owned. The private sector, it's the vectors, who are the target. But what we have is the ability to know things somewhat in advance… how do you get together in a trusted way to be able to share what you have" and protect the nation.

Ultimately, the issue comes down to privacy, she said, and balancing the public's concerns around digital privacy.
"We need to engage a conversation with the American people. The whole security and privacy is often set up as an either-or," Gordon said. "We're going to have to reframe the conversation."

FCW.com:

You Might Also Read:

Will The CIA Be Run By  Robots…?:

Intelligence-Led Policing Gets Automated:

 

« The EU Holds Its First Cyber War Game Exercise
India Cracks Down On Drones »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Quantropi

Quantropi

Quantropi is bound to be the standard for quantum-secure data communications – forever unbreakable, no matter what.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.