Welcome!

@BigDataExpo Authors: William Schmarzo, Elizabeth White, Pat Romanski, Liz McMillan, Angsuman Dutta

Related Topics: @CloudExpo, Java IoT, Linux Containers, Containers Expo Blog, Log Management, @BigDataExpo

@CloudExpo: Article

Leveraging Cloud, Big Data and Mobility Initiatives

In the Boardroom with... Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector

John Felker is the Director, Cyber and Intelligence Strategy, at HP Enterprise Services, U.S. Public Sector. He works to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of the public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: Thank you for joining us today, John. Before we drill down into your perspectives on cybersecurity trends and the current threat landscape, please tell us about your background and your role at HP.

John Felker: Previous to HP, I served almost 30 years as a U.S. Coast Guard (USCG) officer involved in surface operations, international affairs, intelligence and cyber operations. The last seven years of my career in the USCG, I was the Executive Assistant to the Director of Coast Guard Intelligence, Commander of the Coast Guard Cryptologic Group, and Deputy Commander, Coast Guard Cyber Command. In these assignments the focus was on improving Coast Guard intelligence programs, cyber defenses, developing policy and programs for the connection of intelligence supporting cyber defense, and supporting the overall USCG mission. At HP, I currently work to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of our public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: It is commonly stated by industry that today's security threats are more sophisticated than ever. Building walls and reacting to intrusions is no longer enough to keep your critical systems, data and assets secure. On HP.com, the company states that, "HP connects the science and technology of cybersecurity with industry-leading services, products, and solutions. We build in security upfront, so that our services secure the mission of our government clients - not just meet their need for enhanced information technology." Can you elaborate on how HP approaches its client's cybersecurity concerns?

John Felker: HP works hard with our customers to assess and understand their needs and their mission. As a premier provider of risk management and security intelligence solutions, HP enables a broad array of government, commercial enterprise and critical infrastructure enterprises throughout the world to mitigate cyber threats before they can cause harm. By leveraging our global presence, extensive experience and unique understanding of cybersecurity issues, both government and commercial enterprises are able to proactively and effectively meet their cybersecurity challenges, minimizing risks and mitigating threats.

HP has established a long successful history of cybersecurity knowledge, expertise and innovation in order to help our clients successfully:

  • Prepare, Identify, Detect and Disrupt cyber threats through in-depth threat analysis and management, along with comprehensive technologies specifically designed to directly mitigate increasingly sophisticated security attacks.
  • Manage enterprise risk, vulnerability, compliance, governance and operational maturity to proactively model the security control environment in a manner that specifically addresses threats, regulatory dynamics and business demands, across a harmonized control architecture.
  • Extend security, operational and business capabilities by embracing the New Style of IT to drive a more agile security program and enable the business - via secure cloud, mobility and Big Data - to leverage cost-effective delivery models and global presence.

HP takes an enterprise view of security that, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes.

By leveraging cloud, Big Data and mobility initiatives, you can evolve into a more proactive operating model that will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations.

SecuritySolutionsWatch.com: What is your perspective regarding any special cybersecurity considerations necessary to protect our nation's critical infrastructure? For example, recent headlines regarding the military style attack on a California nuclear power station suggest that our energy, transportation and water grids, are particularly vulnerable. What are your thoughts regarding these critical industries?

John Felker: The nation's critical infrastructures are mandated to meet their reliability and performance goals, in addition to effectively addressing the myriad of today's cyber threats. As the threat landscape continues to evolve, presenting new challenges daily, a constructive dialogue between the practitioners of cyber- and physical security needs to occur. On both sides of the responsibility equation there needs to be a recognition of the common areas of concern and increased levels of cooperation - not only for better overall defense, but to maximize allocated resources.

More and more, from a cyber-perspective, the critical infrastructure of our nation is at risk. Whether by nation-state actors, criminal organizations, hacktivists or any number of hackers looking to prove their skills, our country's safety and economic prosperity is threatened. In order to effectively address these evolving cybersecurity threats, there are four primary issues to consider:

  1. Becoming more proactive and dynamic in our cyber-defense efforts through the use of intelligence
  2. Better user behavior management
  3. Assessing risk using meaningful metrics and then conveying those threats in the language that clearly conveys business/mission impact; in essence, putting the information into terms that mean something to executive leadership
  4. Operating resiliently - always operational through any intrusion

In addition to addressing cyber threats, critical infrastructure owners must also harmonize security controls to meet current and emerging regulatory demands. At the end of the day, we must realize that the "systems" we use to operate and manage the elements of our critical infrastructure, are essentially "systems in motion" - that is, constantly changing and evolving. The industrial control systems that operate many aspects of critical infrastructure are now more effectively and economically managed through connection to the Internet, thus, exposing them to greater threat. Because of this exposure, we must become comfortable with the adversary in the "system" and take steps to defend, disrupt, mitigate and proactively create resilience.

SecuritySolutionsWatch.com: In working through such security issues, do you find that management personnel have the proper levels of threat assessment and threat intelligence in place?

John Felker: I believe there are many astute leaders who are beginning to recognize the importance of defending their networks in order to continue to conduct business, maintain operations even during times of intrusion or other disruptive events, and view cyber defense as a net positive. For example, in the electric utility industry, security programs, along with regulatory compliance and resilient operations, generate a huge amount of data that can be used to improve business efficiency as well as security. When you combine efficiency and security you have a powerful impetus to drive system improvement - and today this is generally done with only a "functional/tactical" level of intelligence in hand.

Looking broadly at potential threat actors in terms of their ability, desire and capacity to intrude, and to exploit and remove intellectual property, financial information and personally identifiable information is the next level of threat assessment and intelligence that leaders need to receive, but generally do not. So while management is getting what it needs in terms of daily defensive operations, it is not getting what it needs to make longer term business decisions related to security and risk assessment.

SecuritySolutionsWatch.com: What is your belief when it comes to the IT and operational decision-makers discussing mission strategy and cybersecurity solutions? In other words, do you believe the CIO and CEO truly speak the same language?

John Felker: Generally speaking, the CIO and network defenders talk in terms that relate directly to the network, while the CEO and business leadership tend to talk in terms of business outcomes and long-term strategy. These two lexicons do not necessarily intersect, causing disconnects in the business and budget planning process required to support cybersecurity efforts. At a broad level, an enterprise that understands the items that the CEO views as critical to the organization's mission and business processes is needed to develop a sound cybersecurity profile. Senior leaders must define their organizations' strategic requirements based on what assets and programs are of critical value to the business. Then they must evaluate threat actors - in terms of their motivations and how, based on those motivations, the threat actor may target the organization through cyber means. This understanding can then be used to support cybersecurity priorities over time.

SecuritySolutionsWatch.com: Thank you again for joining us today, John. We appreciate the insights you have shared with us today.

This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.

More Stories By Liz McMillan

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@BigDataExpo Stories
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
SYS-CON Events announced today that SkyScale will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. SkyScale is a world-class provider of cloud-based, ultra-fast multi-GPU hardware platforms for lease to customers desiring the fastest performance available as a service anywhere in the world. SkyScale builds, configures, and manages dedicated systems strategically located in maximum-security...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
Because IoT devices are deployed in mission-critical environments more than ever before, it’s increasingly imperative they be truly smart. IoT sensors simply stockpiling data isn’t useful. IoT must be artificially and naturally intelligent in order to provide more value In his session at @ThingsExpo, John Crupi, Vice President and Engineering System Architect at Greenwave Systems, will discuss how IoT artificial intelligence (AI) can be carried out via edge analytics and machine learning techn...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, will examine the regulations and provide insight on how it affects technology, challenges the established rules and will usher in new levels of diligence a...
Existing Big Data solutions are mainly focused on the discovery and analysis of data. The solutions are scalable and highly available but tedious when swapping in and swapping out occurs in disarray and thrashing takes place. The resolution for thrashing through machine learning algorithms and support nomenclature is through simple techniques. Organizations that have been collecting large customer data are increasingly seeing the need to use the data for swapping in and out and thrashing occurs ...
In the enterprise today, connected IoT devices are everywhere – both inside and outside corporate environments. The need to identify, manage, control and secure a quickly growing web of connections and outside devices is making the already challenging task of security even more important, and onerous. In his session at @ThingsExpo, Rich Boyer, CISO and Chief Architect for Security at NTT i3, discussed new ways of thinking and the approaches needed to address the emerging challenges of security i...
Cloud adoption is often driven by a desire to increase efficiency, boost agility and save money. All too often, however, the reality involves unpredictable cost spikes and lack of oversight due to resource limitations. In his session at 20th Cloud Expo, Joe Kinsella, CTO and Founder of CloudHealth Technologies, tackled the question: “How do you build a fully optimized cloud?” He will examine: Why TCO is critical to achieving cloud success – and why attendees should be thinking holistically ab...
SYS-CON Events announced today that Datera, that offers a radically new data management architecture, has been named "Exhibitor" of SYS-CON's 21st International Cloud Expo ®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera is transforming the traditional datacenter model through modern cloud simplicity. The technology industry is at another major inflection point. The rise of mobile, the Internet of Things, data storage and Big...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, will discuss th...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics ...
SYS-CON Events announced today that Datera will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera offers a radically new approach to data management, where innovative software makes data infrastructure invisible, elastic and able to perform at the highest level. It eliminates hardware lock-in and gives IT organizations the choice to source x86 server nodes, with business model option...
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...