Welcome!

Cloud Expo Authors: Pat Romanski, Carmen Gonzalez, Liz McMillan, Elizabeth White, Yeshim Deniz

Related Topics: Cloud Expo, Java, Linux, Virtualization, HP, Big Data Journal

Cloud Expo: Article

Leveraging Cloud, Big Data and Mobility Initiatives

In the Boardroom with... Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector

John Felker is the Director, Cyber and Intelligence Strategy, at HP Enterprise Services, U.S. Public Sector. He works to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of the public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: Thank you for joining us today, John. Before we drill down into your perspectives on cybersecurity trends and the current threat landscape, please tell us about your background and your role at HP.

John Felker: Previous to HP, I served almost 30 years as a U.S. Coast Guard (USCG) officer involved in surface operations, international affairs, intelligence and cyber operations. The last seven years of my career in the USCG, I was the Executive Assistant to the Director of Coast Guard Intelligence, Commander of the Coast Guard Cryptologic Group, and Deputy Commander, Coast Guard Cyber Command. In these assignments the focus was on improving Coast Guard intelligence programs, cyber defenses, developing policy and programs for the connection of intelligence supporting cyber defense, and supporting the overall USCG mission. At HP, I currently work to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of our public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: It is commonly stated by industry that today's security threats are more sophisticated than ever. Building walls and reacting to intrusions is no longer enough to keep your critical systems, data and assets secure. On HP.com, the company states that, "HP connects the science and technology of cybersecurity with industry-leading services, products, and solutions. We build in security upfront, so that our services secure the mission of our government clients - not just meet their need for enhanced information technology." Can you elaborate on how HP approaches its client's cybersecurity concerns?

John Felker: HP works hard with our customers to assess and understand their needs and their mission. As a premier provider of risk management and security intelligence solutions, HP enables a broad array of government, commercial enterprise and critical infrastructure enterprises throughout the world to mitigate cyber threats before they can cause harm. By leveraging our global presence, extensive experience and unique understanding of cybersecurity issues, both government and commercial enterprises are able to proactively and effectively meet their cybersecurity challenges, minimizing risks and mitigating threats.

HP has established a long successful history of cybersecurity knowledge, expertise and innovation in order to help our clients successfully:

  • Prepare, Identify, Detect and Disrupt cyber threats through in-depth threat analysis and management, along with comprehensive technologies specifically designed to directly mitigate increasingly sophisticated security attacks.
  • Manage enterprise risk, vulnerability, compliance, governance and operational maturity to proactively model the security control environment in a manner that specifically addresses threats, regulatory dynamics and business demands, across a harmonized control architecture.
  • Extend security, operational and business capabilities by embracing the New Style of IT to drive a more agile security program and enable the business - via secure cloud, mobility and Big Data - to leverage cost-effective delivery models and global presence.

HP takes an enterprise view of security that, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes.

By leveraging cloud, Big Data and mobility initiatives, you can evolve into a more proactive operating model that will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations.

SecuritySolutionsWatch.com: What is your perspective regarding any special cybersecurity considerations necessary to protect our nation's critical infrastructure? For example, recent headlines regarding the military style attack on a California nuclear power station suggest that our energy, transportation and water grids, are particularly vulnerable. What are your thoughts regarding these critical industries?

John Felker: The nation's critical infrastructures are mandated to meet their reliability and performance goals, in addition to effectively addressing the myriad of today's cyber threats. As the threat landscape continues to evolve, presenting new challenges daily, a constructive dialogue between the practitioners of cyber- and physical security needs to occur. On both sides of the responsibility equation there needs to be a recognition of the common areas of concern and increased levels of cooperation - not only for better overall defense, but to maximize allocated resources.

More and more, from a cyber-perspective, the critical infrastructure of our nation is at risk. Whether by nation-state actors, criminal organizations, hacktivists or any number of hackers looking to prove their skills, our country's safety and economic prosperity is threatened. In order to effectively address these evolving cybersecurity threats, there are four primary issues to consider:

  1. Becoming more proactive and dynamic in our cyber-defense efforts through the use of intelligence
  2. Better user behavior management
  3. Assessing risk using meaningful metrics and then conveying those threats in the language that clearly conveys business/mission impact; in essence, putting the information into terms that mean something to executive leadership
  4. Operating resiliently - always operational through any intrusion

In addition to addressing cyber threats, critical infrastructure owners must also harmonize security controls to meet current and emerging regulatory demands. At the end of the day, we must realize that the "systems" we use to operate and manage the elements of our critical infrastructure, are essentially "systems in motion" - that is, constantly changing and evolving. The industrial control systems that operate many aspects of critical infrastructure are now more effectively and economically managed through connection to the Internet, thus, exposing them to greater threat. Because of this exposure, we must become comfortable with the adversary in the "system" and take steps to defend, disrupt, mitigate and proactively create resilience.

SecuritySolutionsWatch.com: In working through such security issues, do you find that management personnel have the proper levels of threat assessment and threat intelligence in place?

John Felker: I believe there are many astute leaders who are beginning to recognize the importance of defending their networks in order to continue to conduct business, maintain operations even during times of intrusion or other disruptive events, and view cyber defense as a net positive. For example, in the electric utility industry, security programs, along with regulatory compliance and resilient operations, generate a huge amount of data that can be used to improve business efficiency as well as security. When you combine efficiency and security you have a powerful impetus to drive system improvement - and today this is generally done with only a "functional/tactical" level of intelligence in hand.

Looking broadly at potential threat actors in terms of their ability, desire and capacity to intrude, and to exploit and remove intellectual property, financial information and personally identifiable information is the next level of threat assessment and intelligence that leaders need to receive, but generally do not. So while management is getting what it needs in terms of daily defensive operations, it is not getting what it needs to make longer term business decisions related to security and risk assessment.

SecuritySolutionsWatch.com: What is your belief when it comes to the IT and operational decision-makers discussing mission strategy and cybersecurity solutions? In other words, do you believe the CIO and CEO truly speak the same language?

John Felker: Generally speaking, the CIO and network defenders talk in terms that relate directly to the network, while the CEO and business leadership tend to talk in terms of business outcomes and long-term strategy. These two lexicons do not necessarily intersect, causing disconnects in the business and budget planning process required to support cybersecurity efforts. At a broad level, an enterprise that understands the items that the CEO views as critical to the organization's mission and business processes is needed to develop a sound cybersecurity profile. Senior leaders must define their organizations' strategic requirements based on what assets and programs are of critical value to the business. Then they must evaluate threat actors - in terms of their motivations and how, based on those motivations, the threat actor may target the organization through cyber means. This understanding can then be used to support cybersecurity priorities over time.

SecuritySolutionsWatch.com: Thank you again for joining us today, John. We appreciate the insights you have shared with us today.

This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.

More Stories By Liz McMillan

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
Once the decision has been made to move part or all of a workload to the cloud, a methodology for selecting that workload needs to be established. How do you move to the cloud? What does the discovery, assessment and planning look like? What workloads make sense? Which cloud model makes sense for each workload? What are the considerations for how to select the right cloud model? And how does that fit in with the overall IT tranformation? In his session at 15th Cloud Expo, John Hatem, head of V...
The Internet of Things (IoT) is going to require a new way of thinking and of developing software for speed, security and innovation. This requires IT leaders to balance business as usual while anticipating for the next market and technology trends. Cloud provides the right IT asset portfolio to help today’s IT leaders manage the old and prepare for the new. Today the cloud conversation is evolving from private and public to hybrid. This session will provide use cases and insights to reinforce t...
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, will focus on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19+ years in high tech. At Verizon Enterprise, she focuses on driving growth for the Verizon Cloud pla...
SYS-CON Events announced today that Aria Systems, the recurring revenue expert, has been named "Bronze Sponsor" of SYS-CON's 15th International Cloud Expo®, which will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Aria Systems helps leading businesses connect their customers with the products and services they love. Industry leaders like Pitney Bowes, Experian, AAA NCNU, VMware, HootSuite and many others choose Aria to power their recurring revenue bu...
SYS-CON Events announced today that Calm.io has been named “Bronze Sponsor” of DevOps Summit Silicon Valley, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Calm.io is a cloud orchestration platform for AWS, vCenter, OpenStack, or bare metal, that runs your CL tools puppet, Chef, shell, git, Jenkins, nagios, and will soon support New Relic and Docker. It can run hosted, or on premise and provides VM automation / expiry, self-service portals,...
Cloud services are the newest tool in the arsenal of IT products in the market today. These cloud services integrate process and tools. In order to use these products effectively, organizations must have a good understanding of themselves and their business requirements. In his session at 15th Cloud Expo, Brian Lewis, Principal Architect at Verizon Cloud, will outline key areas of organizational focus, and how to formalize an actionable plan when migrating applications and internal services to...
SYS-CON Events announced today that ElasticBox is holding a Hackathon at DevOps Summit, November 6 from 12 pm -4 pm at the Santa Clara Convention Center in Santa Clara, CA. You can enter as an individual or team of up to 10 developers. A New Star Is Born Every Month! All completed ElasticBoxes will then be sent to a judging panel - 12 winners will be featured on the ElasticBox website in 2015. All entrants will receive five full enterprise licenses for one year + ElasticBox headphones + Elasti...
Ixia develops amazing products so its customers can connect the world. Ixia helps its customers provide an always-on user experience through fast, secure delivery of dynamic connected technologies and services. Through actionable insights that accelerate and secure application and service delivery, Ixia's customers benefit from faster time to market, optimized application performance and higher-quality deployments.
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, will discuss how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP ...
As Platform as a Service (PaaS) matures as a category, developers should have the ability to use the programming language of their choice to build applications and have access to a wide array of services. Bluemix is IBM's open cloud development platform that enables users to easily build cloud-based, creative mobile and web applications without having to spend large amounts of time and resources on configuring infrastructure and multiple software licenses. In this track, you will learn about the...
Blue Box has closed a $10 million Series B financing. The round was led by a strategic investor and included participation from prior investors including Voyager Capital and Founders Collective, as well as the Blue Box executive team. This round follows a $4.3 million Series A closed in December of 2012 and led by Voyager Capital. In May of this year, the company announced general availability of its private cloud as a service offering, Blue Box Cloud. Since that release, the company has dem...
SYS-CON Events announced today that Verizon has been named "Gold Sponsor" of SYS-CON's 15th International Cloud Expo®, which will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Verizon Enterprise Solutions creates global connections that generate growth, drive business innovation and move society forward. With industry-specific solutions and a full range of global wholesale offerings provided over the company's secure mobility, cloud, strategic network...
SimpleECM is the only platform to offer a powerful combination of enterprise content management (ECM) services, capture solutions, and third-party business services providing simplified integrations and workflow development for solution providers. SimpleECM is opening the market to businesses of all sizes by reinventing the delivery of ECM services. Our APIs make the development of ECM services simple with the use of familiar technologies for a frictionless integration directly into web applicat...
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic...
Cloudwick, the leading big data DevOps service and solution provider to the Fortune 1000, announced Big Loop, its multi-vendor operations platform. Cloudwick Big Loop creates greater collaboration between Fortune 1000 IT staff, developers and their database management systems as well as big data vendors. This allows customers to comprehensively manage and oversee their entire infrastructure, which leads to more successful production cluster operations, and scale-out. Cloudwick Big Loop supports ...
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, will discuss how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP ...
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business’s infrastructure required to support an effective web experience… but they are missing a critical component – Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years use...
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation...
What are the benefits of using an enterprise-grade orchestration platform? In their session at 15th Cloud Expo, Jeff Tegethoff, CEO of Appcore, and Kedar Poduri, Senior Director of Product Management at Citrix Systems, will take a closer look at the architectural design factors needed to support diverse workloads and how to run these workloads efficiently as a service provider. They will also discuss how to deploy private cloud environments in 15 minutes or less.
Headquartered in Santa Monica, California, Bitium was founded by Kriz and Erik Gustavson. The 1,500 cloud-based application using Bitium’s analytics, app management, and single sign-on services include bug trackers, customer service dashboards, Google Apps, and social networks. The firm states website administrators can do multiple tasks online without revealing passwords. Bitium’s advisors include Microsoft’s former CMO and the former senior vice president of strategy, the founder and CEO of Li...