The discussion began with an analogy to protecting agencies with strong walls. Each panelist commented on the weakness of focusing solely on endpoint security. When dealing with an insider threat, the size of the wall is not an issue. Encryption may not even be the solution because the insiders may have the encryption keys. The panelists opined on a variety of terms including “breach,” “hack,” and “cyber intrusion.”

The cybersecurity experts then included the role of automation in the discussion. Several examples were given where an automatic response of a threat was appropriate, but there was a much more nuanced response. This is because each threat varies and a patterned response could lead to unintended consequences.

Finally, the panelists gave opinions on the amount of data that has to be analyzed and the approach that can be used to understand that amount. The difficulty is that no analyst can possibly be expected to understand the amount of information thrown at them every day. If machines are producing that much information then, perhaps, the solution is in machines being able to interpret what the data means.

 

<strong>Moderator</strong>

<strong><img class=" alignright" src="http://1yxsm73j7aop3quc9y5ifaw3.wpengine.netdna-cdn.com/wp-content/uploads/2016/05/JOHN-pix-FotoFlexer_Photo-e1462462765252.jpg" alt="JOHN  pix  FotoFlexer_Photo" />John Gilroy, Host of Federal Tech Talk, Federal News Radio</strong>

John Gilroy has been a member of the Washington D.C. technology community for over twenty years. In 2007 he began weekly interviews on Federal News Radio called “Federal Tech Talk with John Gilroy.”   His 428 interviews provides the basis for profitable referral business. In 2009 he created a successful breakfast club of previous radio guests called The Technology Leadership Roundtable. He has been instrumental in two of his guests forming their own radio shows:  Derrick Dortch with “Fed Access” and Aileen Black and Gigi Schumm with “Women in Washington.”

In 2011 he began teaching a course in social media marketing at Georgetown University; in March of 2014, John won the Tropaia Award for Outstanding Faculty.  John conducts monthly corporate training for large companies on how to leverage social media to generate revenue.

&nbsp;

<strong>Panelists</strong>

<strong><img class=" size-full wp-image-1029269 alignright" src="http://federalnewsradio.com/wp-content/uploads/2016/08/Kerry-Long-e1472490577236.jpg" alt="Kerry Long" width="90" height="123" />Kerry Long, Program Manager, IARPA, Office of Director of National Intelligence.</strong>

Kerry Long is a Program Manager for the Intelligence Advanced Research Projects Activity (IARPA), where he specializes in discovering and developing novel methods for securing the computational environments of users, especially user environments in the cloud.  Immediately prior to his assignment at IARPA, he served as a Principal Cyber Security Engineer with MITRE’s Cyber Security Technical Center supporting DOD and IC clients.  Mr. Long has also served as a Computer Scientist for the Army Research Laboratory and an Information Systems Security Engineer for NSA.  He began his career in “Cyber” as a Lieutenant in the U.S. Navy.

&nbsp;

<strong><img class=" size-full wp-image-1029270 alignright" src="http://federalnewsradio.com/wp-content/uploads/2016/08/DPL_Picture-e1472490605584.jpg" alt="DPL_Picture" width="90" height="118" />Deborah Pierre-Louis, Director, Policy, Liaison and Training Oversight Office, Directorate of the Deputy CIO for Information Assurance &amp; Chief Information Security Officer, U.S. Department of State</strong>

Ms. Pierre-Louis has over 20 years of combined military and federal service
in developing strategies linking the existing organizational culture to
modern technology that directly led to better outcomes. She is currently
serving as the Office Director for Policy, Liaison and Training at the US
Department of State.

&nbsp;

<strong><img class=" size-full wp-image-812389 alignright" src="http://federalnewsradio.com/wp-content/uploads/2016/04/Melinda-Rogers-e1460493046345.jpg" alt="Melinda Rogers" width="90" height="113" /></strong>

<strong>Melinda Rogers, Chief Information Security Officer, Department of Justice</strong>

Melinda Rogers is Chief Information Security Officer at the Department of Justice. In this role she leads a team of cybersecurity specialists providing services across DOJ to include: continuous monitoring and diagnostics, security operations and incident response, security architecture, and identity and access management solutions. Additionally, she works across the Federal Government on security matters, coordinating efforts in influencing policy, addressing threats, and establishing capabilities. Prior to DOJ, Melinda served as an Assistant Vice President for Equifax’s Fraud Prevention and Identity Verification Solutions, and held management positions at Procter &amp; Gamble and NationsBank. She holds an MBA from Emory University and a Bachelor’s in Economics from George Mason University.

&nbsp;

<strong><img class=" size-full wp-image-1029276 alignright" src="http://federalnewsradio.com/wp-content/uploads/2016/08/Tim-Estes_CEO_Digital-Reasoning_color-head-shot-e1472490724452.jpg" alt="Tim Estes_CEO_Digital Reasoning_color head shot" width="90" height="126" />Tim Estes, Founder &amp; CEO, Digital Reasoning</strong>

Tim Estes is the CEO and founder of Digital Reasoning, a leader in trusted cognitive computing. Driven by the belief that all software would learn and that all people should have access to it, Tim and his team at Digital Reasoning work closely with leaders in government and industry to solve extraordinarily valuable and morally compelling problems in National Security, Finance, Health Care, and other markets by automating the understanding of human communication.
Insider threat: cybersecurity considerations when the walls will never be thick enough

Five technology experts collaborated to discuss cybersecurity in the federal government with a focus on insider threat. Members of the panel included Kerry Long, program manager at Intelligence Advanced Research Projects Activity (IARPA) in the Office of the Director of National Intelligence; Deborah Pierre-Louis, chief information security officer and director of the Policy, Liaison and Training Oversight Office, Directorate of the Deputy CIO for Information Assurance at the Department of State; Melinda Rogers, chief information security officer at the Department of Justice; and Tim Estes, founder and CEO of Digital Reasoning.
Federal Insights

Intelligent Threat Detection in Government

Insider threat: cybersecurity considerations when the walls will never be thick enough

Five technology experts collaborated to discuss cybersecurity in the federal government with a focus on insider threat. Members of the panel included Kerry Long, program manager at Intelligence Advanced Research Projects Activity (IARPA) in the Office of the Director of National Intelligence; Deborah Pierre-Louis, chief information security officer and director of the Policy, Liaison and Training Oversight Office, Directorate of the Deputy CIO for Information Assurance at the Department of State; Melinda Rogers, chief information security officer at the Department of Justice; and Tim Estes, founder and CEO of Digital Reasoning.

Federal Tech Talk

A unique perspective on cybersecurity