US Intel Leaders “It’s time to be Data Serious”

The US Government says it’s time to get serious about data, how it is collected, curated, and capitalised by humans and machines, otherwise the country could lose its intelligence edge, the Office of the Director of National Intelligence says in a new 3-year Data Strategy Report.

Senior Management of the Senate Intelligence Committee has recently said that Congress has been making a “serious effort” to address emerging technologies, like Artificial Intelligence (AI) and Quantum Computing, but “whether it is enough is something that we really need to ask ourselves.”

“To bridge the gap between where we are today and optimising for the future, we have taken a step back to see what we need to do as a Community to accelerate our data and digital transformation over the next three years so that end-to-end data management is core to what we do and not seen as merely an enabling function,” says The IC (Intelligence Community) Data Strategy 2023-2025.

“To date, we have not significantly prioritised data as a strategic and operational [intelligence community] asset. The central challenge remains that the IC is not fielding data, analytics, and AI enabled capabilities at the pace and scale required to preserve our decision and intelligence advantage,” the document said.

To fix that, the IC wants to fine-tune the “data flow lifecycle from collection and acquisition, to transporting, ingesting, curating, exploiting, disseminating, and disposing of IC data.”

The strategy outlines four main goals: improve data management, ensure data is human and AI-ready with new services and tools, directly work with the private sector and academia, and develop intelligence officers who are fluent in how data works.

The ODNI’s strategy calls for automation to prepare and label data to reduce the time it takes to absorb datasets from days to minutes.

Also, every time data is collected or bought, intel agencies will have to lay out how it will be transported, ingested, curated, exploited, disseminated, and disposed of “with consideration for its ethical and appropriate use, consistent with law and policy,” according to the strategy.

That type of data management will help solidify “minimum common standards for the use, protection, dissemination, interoperability, and generation of IC data.”

Bolstering partnerships is another key pillar of the strategy, which could help with not having a full data workforce.

“Data acumen has to become a core skill for every member of the workforce, not just for data professionals. The workforce and supporting contractors need to know, understand, and value data utilisation and sharing for mission value and insight,” the document said.

But there’s still the need for people who can make that happen.

“How do we work across, not only inside our buildings, but across the IC, across the US government, swith our industry academic partners, so that we can really bring the best of what there is to bear in support of our mission,” said Lakshmi Raman, the Central Intelligence Agency’s director of AI innovation, during a panel discussion at the Intelligence and National Security Summit recently.
 
“We don't have enough resources to do everything that we need to do.”

Defense One:     DRI:     Meri Talk:     United States Senate:     ExecutiveGov:     DRI

 

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« JumpCloud Says Nation-State Hackers Hit Specific Customers
Software Faults Ground F-35 Warplanes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.

SeQure

SeQure

SeQure is a novel cybersecurity and data observability company that offers Fortune 100 and Governments a zero-trust service to continuously monitor large network environments.