Welcome!

@CloudExpo Authors: Elizabeth White, Pat Romanski, Rostyslav Demush, Automic Blog, Liz McMillan

Related Topics: @CloudExpo, Java IoT, Linux Containers, Containers Expo Blog, Log Management, @DXWorldExpo

@CloudExpo: Article

Leveraging Cloud, Big Data and Mobility Initiatives

In the Boardroom with... Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector

John Felker is the Director, Cyber and Intelligence Strategy, at HP Enterprise Services, U.S. Public Sector. He works to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of the public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: Thank you for joining us today, John. Before we drill down into your perspectives on cybersecurity trends and the current threat landscape, please tell us about your background and your role at HP.

John Felker: Previous to HP, I served almost 30 years as a U.S. Coast Guard (USCG) officer involved in surface operations, international affairs, intelligence and cyber operations. The last seven years of my career in the USCG, I was the Executive Assistant to the Director of Coast Guard Intelligence, Commander of the Coast Guard Cryptologic Group, and Deputy Commander, Coast Guard Cyber Command. In these assignments the focus was on improving Coast Guard intelligence programs, cyber defenses, developing policy and programs for the connection of intelligence supporting cyber defense, and supporting the overall USCG mission. At HP, I currently work to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of our public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: It is commonly stated by industry that today's security threats are more sophisticated than ever. Building walls and reacting to intrusions is no longer enough to keep your critical systems, data and assets secure. On HP.com, the company states that, "HP connects the science and technology of cybersecurity with industry-leading services, products, and solutions. We build in security upfront, so that our services secure the mission of our government clients - not just meet their need for enhanced information technology." Can you elaborate on how HP approaches its client's cybersecurity concerns?

John Felker: HP works hard with our customers to assess and understand their needs and their mission. As a premier provider of risk management and security intelligence solutions, HP enables a broad array of government, commercial enterprise and critical infrastructure enterprises throughout the world to mitigate cyber threats before they can cause harm. By leveraging our global presence, extensive experience and unique understanding of cybersecurity issues, both government and commercial enterprises are able to proactively and effectively meet their cybersecurity challenges, minimizing risks and mitigating threats.

HP has established a long successful history of cybersecurity knowledge, expertise and innovation in order to help our clients successfully:

  • Prepare, Identify, Detect and Disrupt cyber threats through in-depth threat analysis and management, along with comprehensive technologies specifically designed to directly mitigate increasingly sophisticated security attacks.
  • Manage enterprise risk, vulnerability, compliance, governance and operational maturity to proactively model the security control environment in a manner that specifically addresses threats, regulatory dynamics and business demands, across a harmonized control architecture.
  • Extend security, operational and business capabilities by embracing the New Style of IT to drive a more agile security program and enable the business - via secure cloud, mobility and Big Data - to leverage cost-effective delivery models and global presence.

HP takes an enterprise view of security that, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes.

By leveraging cloud, Big Data and mobility initiatives, you can evolve into a more proactive operating model that will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations.

SecuritySolutionsWatch.com: What is your perspective regarding any special cybersecurity considerations necessary to protect our nation's critical infrastructure? For example, recent headlines regarding the military style attack on a California nuclear power station suggest that our energy, transportation and water grids, are particularly vulnerable. What are your thoughts regarding these critical industries?

John Felker: The nation's critical infrastructures are mandated to meet their reliability and performance goals, in addition to effectively addressing the myriad of today's cyber threats. As the threat landscape continues to evolve, presenting new challenges daily, a constructive dialogue between the practitioners of cyber- and physical security needs to occur. On both sides of the responsibility equation there needs to be a recognition of the common areas of concern and increased levels of cooperation - not only for better overall defense, but to maximize allocated resources.

More and more, from a cyber-perspective, the critical infrastructure of our nation is at risk. Whether by nation-state actors, criminal organizations, hacktivists or any number of hackers looking to prove their skills, our country's safety and economic prosperity is threatened. In order to effectively address these evolving cybersecurity threats, there are four primary issues to consider:

  1. Becoming more proactive and dynamic in our cyber-defense efforts through the use of intelligence
  2. Better user behavior management
  3. Assessing risk using meaningful metrics and then conveying those threats in the language that clearly conveys business/mission impact; in essence, putting the information into terms that mean something to executive leadership
  4. Operating resiliently - always operational through any intrusion

In addition to addressing cyber threats, critical infrastructure owners must also harmonize security controls to meet current and emerging regulatory demands. At the end of the day, we must realize that the "systems" we use to operate and manage the elements of our critical infrastructure, are essentially "systems in motion" - that is, constantly changing and evolving. The industrial control systems that operate many aspects of critical infrastructure are now more effectively and economically managed through connection to the Internet, thus, exposing them to greater threat. Because of this exposure, we must become comfortable with the adversary in the "system" and take steps to defend, disrupt, mitigate and proactively create resilience.

SecuritySolutionsWatch.com: In working through such security issues, do you find that management personnel have the proper levels of threat assessment and threat intelligence in place?

John Felker: I believe there are many astute leaders who are beginning to recognize the importance of defending their networks in order to continue to conduct business, maintain operations even during times of intrusion or other disruptive events, and view cyber defense as a net positive. For example, in the electric utility industry, security programs, along with regulatory compliance and resilient operations, generate a huge amount of data that can be used to improve business efficiency as well as security. When you combine efficiency and security you have a powerful impetus to drive system improvement - and today this is generally done with only a "functional/tactical" level of intelligence in hand.

Looking broadly at potential threat actors in terms of their ability, desire and capacity to intrude, and to exploit and remove intellectual property, financial information and personally identifiable information is the next level of threat assessment and intelligence that leaders need to receive, but generally do not. So while management is getting what it needs in terms of daily defensive operations, it is not getting what it needs to make longer term business decisions related to security and risk assessment.

SecuritySolutionsWatch.com: What is your belief when it comes to the IT and operational decision-makers discussing mission strategy and cybersecurity solutions? In other words, do you believe the CIO and CEO truly speak the same language?

John Felker: Generally speaking, the CIO and network defenders talk in terms that relate directly to the network, while the CEO and business leadership tend to talk in terms of business outcomes and long-term strategy. These two lexicons do not necessarily intersect, causing disconnects in the business and budget planning process required to support cybersecurity efforts. At a broad level, an enterprise that understands the items that the CEO views as critical to the organization's mission and business processes is needed to develop a sound cybersecurity profile. Senior leaders must define their organizations' strategic requirements based on what assets and programs are of critical value to the business. Then they must evaluate threat actors - in terms of their motivations and how, based on those motivations, the threat actor may target the organization through cyber means. This understanding can then be used to support cybersecurity priorities over time.

SecuritySolutionsWatch.com: Thank you again for joining us today, John. We appreciate the insights you have shared with us today.

This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.

More Stories By Liz McMillan

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
"Infoblox does DNS, DHCP and IP address management for not only enterprise networks but cloud networks as well. Customers are looking for a single platform that can extend not only in their private enterprise environment but private cloud, public cloud, tracking all the IP space and everything that is going on in that environment," explained Steve Salo, Principal Systems Engineer at Infoblox, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventio...
Data scientists must access high-performance computing resources across a wide-area network. To achieve cloud-based HPC visualization, researchers must transfer datasets and visualization results efficiently. HPC clusters now compute GPU-accelerated visualization in the cloud cluster. To efficiently display results remotely, a high-performance, low-latency protocol transfers the display from the cluster to a remote desktop. Further, tools to easily mount remote datasets and efficiently transfer...
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented ...
In his session at 21st Cloud Expo, James Henry, Co-CEO/CTO of Calgary Scientific Inc., introduced you to the challenges, solutions and benefits of training AI systems to solve visual problems with an emphasis on improving AIs with continuous training in the field. He explored applications in several industries and discussed technologies that allow the deployment of advanced visualization solutions to the cloud.
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"NetApp is known as a data management leader but we do a lot more than just data management on-prem with the data centers of our customers. We're also big in the hybrid cloud," explained Wes Talbert, Principal Architect at NetApp, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Codigm is based on the cloud and we are here to explore marketing opportunities in America. Our mission is to make an ecosystem of the SW environment that anyone can understand, learn, teach, and develop the SW on the cloud," explained Sung Tae Ryu, CEO of Codigm, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're developing a software that is based on the cloud environment and we are providing those services to corporations and the general public," explained Seungmin Kim, CEO/CTO of SM Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're focused on how to get some of the attributes that you would expect from an Amazon, Azure, Google, and doing that on-prem. We believe today that you can actually get those types of things done with certain architectures available in the market today," explained Steve Conner, VP of Sales at Cloudistics, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, provided a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to oper...