Related Topics: @CloudExpo, Java IoT, Linux Containers, Containers Expo Blog, Log Management, @BigDataExpo

@CloudExpo: Article

Leveraging Cloud, Big Data and Mobility Initiatives

In the Boardroom with... Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector

John Felker is the Director, Cyber and Intelligence Strategy, at HP Enterprise Services, U.S. Public Sector. He works to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of the public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: Thank you for joining us today, John. Before we drill down into your perspectives on cybersecurity trends and the current threat landscape, please tell us about your background and your role at HP.

John Felker: Previous to HP, I served almost 30 years as a U.S. Coast Guard (USCG) officer involved in surface operations, international affairs, intelligence and cyber operations. The last seven years of my career in the USCG, I was the Executive Assistant to the Director of Coast Guard Intelligence, Commander of the Coast Guard Cryptologic Group, and Deputy Commander, Coast Guard Cyber Command. In these assignments the focus was on improving Coast Guard intelligence programs, cyber defenses, developing policy and programs for the connection of intelligence supporting cyber defense, and supporting the overall USCG mission. At HP, I currently work to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of our public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: It is commonly stated by industry that today's security threats are more sophisticated than ever. Building walls and reacting to intrusions is no longer enough to keep your critical systems, data and assets secure. On HP.com, the company states that, "HP connects the science and technology of cybersecurity with industry-leading services, products, and solutions. We build in security upfront, so that our services secure the mission of our government clients - not just meet their need for enhanced information technology." Can you elaborate on how HP approaches its client's cybersecurity concerns?

John Felker: HP works hard with our customers to assess and understand their needs and their mission. As a premier provider of risk management and security intelligence solutions, HP enables a broad array of government, commercial enterprise and critical infrastructure enterprises throughout the world to mitigate cyber threats before they can cause harm. By leveraging our global presence, extensive experience and unique understanding of cybersecurity issues, both government and commercial enterprises are able to proactively and effectively meet their cybersecurity challenges, minimizing risks and mitigating threats.

HP has established a long successful history of cybersecurity knowledge, expertise and innovation in order to help our clients successfully:

  • Prepare, Identify, Detect and Disrupt cyber threats through in-depth threat analysis and management, along with comprehensive technologies specifically designed to directly mitigate increasingly sophisticated security attacks.
  • Manage enterprise risk, vulnerability, compliance, governance and operational maturity to proactively model the security control environment in a manner that specifically addresses threats, regulatory dynamics and business demands, across a harmonized control architecture.
  • Extend security, operational and business capabilities by embracing the New Style of IT to drive a more agile security program and enable the business - via secure cloud, mobility and Big Data - to leverage cost-effective delivery models and global presence.

HP takes an enterprise view of security that, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes.

By leveraging cloud, Big Data and mobility initiatives, you can evolve into a more proactive operating model that will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations.

SecuritySolutionsWatch.com: What is your perspective regarding any special cybersecurity considerations necessary to protect our nation's critical infrastructure? For example, recent headlines regarding the military style attack on a California nuclear power station suggest that our energy, transportation and water grids, are particularly vulnerable. What are your thoughts regarding these critical industries?

John Felker: The nation's critical infrastructures are mandated to meet their reliability and performance goals, in addition to effectively addressing the myriad of today's cyber threats. As the threat landscape continues to evolve, presenting new challenges daily, a constructive dialogue between the practitioners of cyber- and physical security needs to occur. On both sides of the responsibility equation there needs to be a recognition of the common areas of concern and increased levels of cooperation - not only for better overall defense, but to maximize allocated resources.

More and more, from a cyber-perspective, the critical infrastructure of our nation is at risk. Whether by nation-state actors, criminal organizations, hacktivists or any number of hackers looking to prove their skills, our country's safety and economic prosperity is threatened. In order to effectively address these evolving cybersecurity threats, there are four primary issues to consider:

  1. Becoming more proactive and dynamic in our cyber-defense efforts through the use of intelligence
  2. Better user behavior management
  3. Assessing risk using meaningful metrics and then conveying those threats in the language that clearly conveys business/mission impact; in essence, putting the information into terms that mean something to executive leadership
  4. Operating resiliently - always operational through any intrusion

In addition to addressing cyber threats, critical infrastructure owners must also harmonize security controls to meet current and emerging regulatory demands. At the end of the day, we must realize that the "systems" we use to operate and manage the elements of our critical infrastructure, are essentially "systems in motion" - that is, constantly changing and evolving. The industrial control systems that operate many aspects of critical infrastructure are now more effectively and economically managed through connection to the Internet, thus, exposing them to greater threat. Because of this exposure, we must become comfortable with the adversary in the "system" and take steps to defend, disrupt, mitigate and proactively create resilience.

SecuritySolutionsWatch.com: In working through such security issues, do you find that management personnel have the proper levels of threat assessment and threat intelligence in place?

John Felker: I believe there are many astute leaders who are beginning to recognize the importance of defending their networks in order to continue to conduct business, maintain operations even during times of intrusion or other disruptive events, and view cyber defense as a net positive. For example, in the electric utility industry, security programs, along with regulatory compliance and resilient operations, generate a huge amount of data that can be used to improve business efficiency as well as security. When you combine efficiency and security you have a powerful impetus to drive system improvement - and today this is generally done with only a "functional/tactical" level of intelligence in hand.

Looking broadly at potential threat actors in terms of their ability, desire and capacity to intrude, and to exploit and remove intellectual property, financial information and personally identifiable information is the next level of threat assessment and intelligence that leaders need to receive, but generally do not. So while management is getting what it needs in terms of daily defensive operations, it is not getting what it needs to make longer term business decisions related to security and risk assessment.

SecuritySolutionsWatch.com: What is your belief when it comes to the IT and operational decision-makers discussing mission strategy and cybersecurity solutions? In other words, do you believe the CIO and CEO truly speak the same language?

John Felker: Generally speaking, the CIO and network defenders talk in terms that relate directly to the network, while the CEO and business leadership tend to talk in terms of business outcomes and long-term strategy. These two lexicons do not necessarily intersect, causing disconnects in the business and budget planning process required to support cybersecurity efforts. At a broad level, an enterprise that understands the items that the CEO views as critical to the organization's mission and business processes is needed to develop a sound cybersecurity profile. Senior leaders must define their organizations' strategic requirements based on what assets and programs are of critical value to the business. Then they must evaluate threat actors - in terms of their motivations and how, based on those motivations, the threat actor may target the organization through cyber means. This understanding can then be used to support cybersecurity priorities over time.

SecuritySolutionsWatch.com: Thank you again for joining us today, John. We appreciate the insights you have shared with us today.

This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.

More Stories By Liz McMillan

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

Latest Stories
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Big Data has been changing the world. IoT fuels the further transformation recently. How are Big Data and IoT related? In his session at @BigDataExpo, Tony Shan, a renowned visionary and thought leader, will explore the interplay of Big Data and IoT. He will anatomize Big Data and IoT separately in terms of what, which, why, where, when, who, how and how much. He will then analyze the relationship between IoT and Big Data, specifically the drilldown of how the 4Vs of Big Data (Volume, Variety,...
Between the mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at @DevOpsSummit at 19th Cloud Expo, Charles Kendrick, CTO at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how business and deve...
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Qosmos, the market leader for IP traffic classification and network intelligence technology, has announced that it will launch the Launch L7 Viewer at CloudExpo | @ThingsExpo Silicon Valley, being held November 1 – 3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The L7 Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migra...
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ...
As the world moves toward more DevOps and Microservices, application deployment to the cloud ought to become a lot simpler. The Microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. Serverless computing is revolutionizing computing. In his session at 19th Cloud Expo, Raghav...
So you think you are a DevOps warrior, huh? Put your money (not really, it’s free) where your metrics are and prove it by taking The Ultimate DevOps Geek Quiz Challenge, sponsored by DevOps Summit. Battle through the set of tough questions created by industry thought leaders to earn your bragging rights and win some cool prizes.
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here