One Article Review

Accueil - L'article:
Source Anomali.webp Anomali
Identifiant 2763546
Date de publication 2021-05-10 17:56:00 (vue: 2021-05-10 20:05:34)
Titre Rise of the Chief Intelligence Officer (CINO)
Texte Anomali Sr. Director of Cyber Intelligence Strategy A.J. Nash recently penned a column for United States Cybersecurity Magazine about how changing security challenges call for new skillsets and leadership professionals, who can help to develop ad run new programs that keep pace with modern adversaries. In “Rise of the Chief Intelligence Officer (CINO),” A.J. makes a case for why this position is needed and what such a leader’s skill set and experience should include. It is republished here in its entirety and with full permission. In response to growing threats in cyberspace, private sector organizations began creating Intelligence programs nearly a decade ago, usually referred to as Cyber Threat Intelligence (CTI). In theory, the private sector was attempting to replicate what the government has successfully done for generations: gain informational advantage to prevent enemy victories and mitigate damage from enemy successes. While most large enterprises today have some sort of a CTI program, the majority are using the word “intelligence” without the tradecraft, standards, or processes to support the label. “Intelligence” in the private sector is still primarily tactical and technical cybersecurity led by people with backgrounds to match. Best practices for collection, production, and dissemination of intelligence are rarely known by those charged with the responsibilities of an intelligence organization. Moreover, only a handful of companies have integrated intelligence into enterprise-wide processes for optimization of outputs that meet documented organizational goals and objectives. Instead of being intelligence-driven security practices, much of the private sector remains underinvested and underprepared. Worse yet, most organizations with CTI programs, even effective ones, restrict their own ability to capitalize on the time and money invested in CTI because their vision for Intelligence is limited to the Security Operations Center (SOC). The root cause for these challenges is a fundamental misunderstanding of intelligence, borne out of ignorance for the differences between Cybersecurity and Intelligence as independent career fields. Instead of being focused on Indicators Of Compromise (IOCs), signatures, and response actions, Intelligence should be a means of countering threats, cybersecurity or otherwise, and driving enterprise-wide improvements in risk reduction. The answer to this challenge is to capitalize on the lessons learned by the U.S. Government (USG) regarding Intelligence. Just as there is a Director of National Intelligence (DNI) who reports directly to the President and leads the U.S. Intelligence Community “in intelligence integration, forging a community that delivers the most insightful intelligence possible,”[1] private sector enterprises each need a single Intelligence leader reporting directly to the CEO, President, or Board of Directors. Instead of the sole intelligence function of a company being a CTI team buried inside the SOC and focused on defensive cyber operations or the needs of the Chief Information Security Officer (CISO), establishment of the Chief Intelligence Officer (CINO) will enable companies to maximize the value of their investments, eliminate redundancies, and reduce risk. In the 1980’s, as C-suites expanded to include Chief Information Officers (CIO),and in the 2010’s, to include Chief Security Officers (CSO) and Chief Human Resources Officers (CHRO), it is time to open a new seat at the table for the first Chief Intelligence Officer (CINO). The Ideal CINO Candidate When adding a chair in the boardroom, it is important to assess what unique value the new addition will bring to the Executive Staff (E-Staff). The skills and experiences needed for the newly minted CINO start with a deep knowledge of traditional intelligence standards and practices as well as impeccable integrity and judgement. This will be the senior expert on Intelligence a
Envoyé Oui
Condensat “in “rise “shiny 1980’s 2010’s 203 206 208 ability able about above access acquisitions across act action actionable actions activeresponse adding addition adjustment adopting advantage advantages adversaries against agent ago all already although among analysis analytic anomali answer any approach apr09 are are/mission assess assessment assessments att&ck attempting authoring authoritative authority available background backgrounds based because began being benefit benefits best between beyond board board; boardroom body borne both brand bring build buried business but bypassed call can candidate candidates capable capitalize career case catastrophic cause caused caveats cco center ceo cfo chain chair challenge challenges change changes changing characteristics charged chief chro cia cino cino’s cio ciso clear clo cmo collection column com/enus/capabilities/cyber/cyber common communications community companies company competing compliance compromise concept concepts confidence connections consists coo corporate counsel countering counterparts courses cpo create creates creating creation crio crises crisis criteria critical cso cti current currently customer customers; cyber cybersecurity cyberspace cycle damage decade decisions deep defensive delivered delivering delivers delivery demonstrating described develop diamond differences direction directives directly director directors disproportionately dissemination dni documented done down drive driven drives driving due duplication each easiest easy educate effective effort efforts eir eirs either elevated elevating eliminate emotional empower enable enemy energy enforcement enforcing enough ensures enterprise enterprises entire entirety entities equal established establishing establishment estimates even except executive exist existing expanded expanding expend expenditures expense experience experiences expert expertise facilities factor factors: fair fairinstitute familiarity fields figure finally financial finding first five focused following follows: forcing forging foundation framework frameworks from full function fundamental furthermore future gain generations: goals gov/cyberframework gov/index gov/static/955180a45afe3f5013772c313b16face/tradecraft governance government grc grow growing handful has have having help here hoc how html https://attack https://fas https://www human icds ideal ignorance immediate impact impeccable important improve improvements incident include including inconsistent independent indicators individual individuals industry inefficient influenced influencing influential inform information informational informed informing inside insider insightful instance instead institute integrated integration integrity intelligence intelligence: interesting interests intrusion invested investigation investment investments iocs its judgement just keep kill knowledge known label language large later lead leader leader’s leaders leadership leads learned led legal lessons light like likely limited lines locating lockheedmartin longer loss m&a magazine main maintain maintaining maintenance majority make makes making management managers mandate many map marketing match matter mature maximize may means meant meet merged mergers messages mindset minimizing minted misunderstanding mitigate mitre model modern money more moreover most move much multiple must nash national near nearly need needed needs new newly nist not note objectively objectives objects” offensive offers officer officers often one ones only open operations opinions optimization org/ org/fair org/irp/dni/icd/icd org/tlp/ org/wpcontent/uploads/2013/07/diamond organization organizational organizations other others otherwise out outlook output outputs over overall own pace parochialism parties partnerships patterns paying pdf peer; peers penned people permission personal personnel php/who physical picture: piping plague political poorly position possible practices president prevent previously primarily primer priorities prioritization prioriti
Tags Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: