IC ITE: Industry Perspectives

IC ITE: Industry Perspectives

Following its February 2013 white paper on the Intelligence Community Information Technology Enterprise (IC ITE), IC ITE – Doing in Common What Is Commonly Done, the INSA IC ITE Task Force conducted four panel discussions on areas identified as essential to IC ITE’s success: the governance model, the business model, security and risk management, technology and innovation.   DOWNLOAD NOW ...

Smart Change II: Preparing the Intelligence Community Workforce for an Evolving Threat and Fiscal

Smart Change II: Preparing the Intelligence Community Workforce for an Evolving Threat and Fiscal

Current budget realities make clear that resources available for intelligence activities will continue to decline in the near-term. Since the publication of the INSA white paper Smart Change in May 2011, the IC has experienced the initial effects of sequestration, the furlough of some parts of the workforce, contract employees unable to perform important services without government supervision, a 16-day government shutdown, and the realities of a significantly reduced budget—all at a time when t ...

Strategic Cyber Intelligence

Strategic Cyber Intelligence

The Intelligence and National Security Alliance (INSA) Cyber Intelligence Task Force defined the strategic, operational, and tactical levels of Cyber Intelligence in its white paper The Operational Levels of Cyber Intelligence. While much attention has been directed towards the tactical, on-the-network cyber domain, this paper contends that not enough resources have been devoted to strategic cyber intelligence.   DOWNLOAD NOW ...

A Preliminary Examination of Insider Threat programs in the U.S. Private Sector

A Preliminary Examination of Insider Threat programs in the U.S. Private Sector

With Executive Order 13587 in 2011, the Federal government demonstrated increased attention to its insider threat mitigation programs. However, no mandates, standards, or benchmarks exist for insider threat programs in the private sector. Therefore, it is difficult for companies to assess where their insider threat mitigation strategies stand relative to the broader industry. The purpose of this report is to provide a preliminary examination of insider threat programs in the U.S. private sector. ...

Operational Levels of Cyber Intelligence

Operational Levels of Cyber Intelligence

The purpose of this paper is to explore Cyber Intelligence as a disciplined methodology with understandable frames of reference in the form of operational levels. It seeks to inform both government and private industry, with an appreciation for the fact that not all of the relevant decision-makers at various organizations levels will share a common view of the challenges associated with conducting business or operations in cyberspace, nor how to best thwart adversarial activity.   D ...

Emerging Science and Technologies

Emerging Science and Technologies

U.S. investment in fundamental research, which enhances national security and spurs economic growth, has declined relative to other countries. While the U.S. continues to maintain a position of leadership, in recent decades the gap between the U.S. and potential competitors has narrowed, largely as the result of concerted investments in science and technology in Asia and Europe.   DOWNLOAD NOW   ...

Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community

Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community

This white paper, written by INSA's Cyber Council’s Cloud Computing Task Force, is the culmination of a study of technologies, issues, requirements and observations on the topic of cloud computing in the national security space. This paper looks at the broad area of cloud computing as it is being implemented by some of the nation's greatest thought leaders on the topic, including lead architects at IC agencies and ODNI, as well as their partners in the private sector. The paper's conclusions foc ...

Cyber Intelligence: Setting the landscape for an emerging discipline

Cyber Intelligence: Setting the landscape for an emerging discipline

Evolving information systems technology has turned the cyber arena into a multi-dimensional attack space that extends the conventional landscape to a virtual domain where key economic and national security assets are exposed to significant threats. Individual, commercial, national, and international activities interact in this domain, increasing the space for offensive and defensive operations. Cyberspace is a haven for a broad range of disruptive operations, including reconnaissance, theft, sabo ...

SMART Change: Lessons of the Past, Direction for the Future

SMART Change: Lessons of the Past, Direction for the Future

The U.S. Intelligence Community (IC) provides critical information to key policy makers and military commanders, giving these leaders unique advantages in the execution of their national security responsibilities.  In this current period of economic challenges and large government deficits, the IC will likely be asked to do its fair share to economize and reduce spending as much as possible without jeopardizing the mission critical intelligence capabilities that provide this decision advantage. ...

Close
Close

Please enter your username or email address. You will receive a link to create a new password via email.

Close

Close