Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data and artificial intelligence is a major priority for the intelligence community.

During a Sept. 7 panel discussion at the Intelligence and National Security Summit in Washington, DC, directors and deputies representing five branches of the intelligence community, including the National Security Agency, FBI, Defense Intelligence Agency and the National Geospatial-Intelligence Agency, zeroed in on the need to push past proficiency in AI and cyber.

"We have to be much more data-centric, much more savvy in how we handle data," said Melissa Drisko, the Defense Intelligence Agency's deputy director. "There are secrets there that we got to find. It's how do you find those."

"As we're looking at algorithmic analysis, artificial intelligence, machine learning, we're finding the we're having to examine what the role of the human and the analyst," she said. "It's kind of scary…but what's the role, what do we look like in 10 years…and even as we try to define it does that make [the role of the analyst] obsolete."

But for a community that values the tangible, new technology carries risks that only humans can mitigate.

"The bedrock of our profession is credibility, it is trust," said National Geospatial-Intelligence Agency Director Robert Cardillo. But as the community embraces AI, "We've got to hold on to credibility or we'll lose our lifeline."

For Navy Adm. Michael Rogers, NSA director and head of US Cyber Command, embracing technology doesn't mean losing the human element, even when there's a risk.

"I don't see us abdicating everything to a machine," he said. "I see us asking ourselves 'so where does [using] this technology make sense.'"

Cyber threats and the ability to handle them were another top concern.

"The cyber domain is blurry, it intersects each other," said the principal deputy director of national intelligence, Sue Gordon, who spoke separately at the same conference.

When it comes to, cyber "we need to get our act together," Gordon said. "Ninety percent of the issue is not government owned. The private sector, it's the vectors, who are the target. But what we have is the ability to know things somewhat in advance… how do you get together in a trusted way to be able to share what you have" and protect the nation.

Ultimately, the issue comes down to privacy, she said, and balancing the public's concerns around digital privacy.
"We need to engage a conversation with the American people. The whole security and privacy is often set up as an either-or," Gordon said. "We're going to have to reframe the conversation."

FCW.com:

You Might Also Read:

Will The CIA Be Run By  Robots…?:

Intelligence-Led Policing Gets Automated:

 

« The EU Holds Its First Cyber War Game Exercise
India Cracks Down On Drones »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

White Tuque

White Tuque

A new way to protect your organization. White Tuque is your partner in identifying threats, understanding your risk, and ensuring your business remains resilient.

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.