A Preliminary Examination of Insider Threat programs in the U.S. Private Sector

A Preliminary Examination of Insider Threat programs in the U.S. Private Sector

With Executive Order 13587 in 2011, the Federal government demonstrated increased attention to its insider threat mitigation programs. However, no mandates, standards, or benchmarks exist for insider threat programs in the private sector. Therefore, it is difficult for companies to assess where their insider threat mitigation strategies stand relative to the broader industry. The purpose of this report is to provide a preliminary examination of insider threat programs in the U.S. private sector. ...

Operational Levels of Cyber Intelligence

Operational Levels of Cyber Intelligence

The purpose of this paper is to explore Cyber Intelligence as a disciplined methodology with understandable frames of reference in the form of operational levels. It seeks to inform both government and private industry, with an appreciation for the fact that not all of the relevant decision-makers at various organizations levels will share a common view of the challenges associated with conducting business or operations in cyberspace, nor how to best thwart adversarial activity.   D ...

Emerging Science and Technologies

Emerging Science and Technologies

U.S. investment in fundamental research, which enhances national security and spurs economic growth, has declined relative to other countries. While the U.S. continues to maintain a position of leadership, in recent decades the gap between the U.S. and potential competitors has narrowed, largely as the result of concerted investments in science and technology in Asia and Europe.   DOWNLOAD NOW   ...

Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community

Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community

This white paper, written by INSA's Cyber Council’s Cloud Computing Task Force, is the culmination of a study of technologies, issues, requirements and observations on the topic of cloud computing in the national security space. This paper looks at the broad area of cloud computing as it is being implemented by some of the nation's greatest thought leaders on the topic, including lead architects at IC agencies and ODNI, as well as their partners in the private sector. The paper's conclusions foc ...

Cyber Intelligence: Setting the landscape for an emerging discipline

Cyber Intelligence: Setting the landscape for an emerging discipline

Evolving information systems technology has turned the cyber arena into a multi-dimensional attack space that extends the conventional landscape to a virtual domain where key economic and national security assets are exposed to significant threats. Individual, commercial, national, and international activities interact in this domain, increasing the space for offensive and defensive operations. Cyberspace is a haven for a broad range of disruptive operations, including reconnaissance, theft, sabo ...

SMART Change: Lessons of the Past, Direction for the Future

SMART Change: Lessons of the Past, Direction for the Future

The U.S. Intelligence Community (IC) provides critical information to key policy makers and military commanders, giving these leaders unique advantages in the execution of their national security responsibilities.  In this current period of economic challenges and large government deficits, the IC will likely be asked to do its fair share to economize and reduce spending as much as possible without jeopardizing the mission critical intelligence capabilities that provide this decision advantage. ...

Intelligence Community Acquisition & Development

Intelligence Community Acquisition & Development

Effective system development requires recommendations that can gain the concurrence of the Intelligence Community’s many stakeholders and be implemented. The Community faces many challenges in the acquisition and development of new capabilities (e.g., collection against foreign WMD programs,2 and in support of counterinsurgency operations, and meaningful fusion of information from disparate sources). These challenges are real problems that impair the nation’s ability to gather, analyze, and empl ...

Close
Close

Please enter your username or email address. You will receive a link to create a new password via email.

Close

Close