This site uses cookies to provide you with a more responsive and personalized service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print this page

Outside In, Inside Out

Next generation cyber center operations

“As we look at the next generation of Cyber Center Operations, it’s really critical to look at the business end of it.” Mike Brown, Specialist Leader, Deloitte & Touche LLP.

Speakers:

  • Mike Brown
    Specialist Leader, Deloitte & Touche LLP
    (Former Director, Office of Information Systems Security, Federal Aviation Administration)
  • Kevin Brault
    Principal, Deloitte & Touche LLP
    Leader, Federal Cyber Center Operations
  • LTG Pete Cuviello, USA (Ret)
    Director, Deloitte Consulting LLP
    (Former Chief Information Officer, G6, US Army)
  • Amry Junaideen
    Principal, Deloitte & Touche LLP
    Leader, Federal Cyber and Technology Risk practices
  • JR Reagan
    Principal, Deloitte & Touche LLP
    Chief Federal Innovation Officer

Transcript:

Mike Brown
Specialist Leader, Deloitte & Touche LLP
(Former Director, Office of Information Systems Security, Federal Aviation Administration)

The cyber landscape has really changed dramatically over the last few years and has really created new challenges for those people who are charged with protecting federal information as well as federal systems.

Kevin Brault
Principal, Deloitte & Touche LLP
Leader, Federal Cyber Center Operations

A lot of talk about cyber operations has traditionally been about internally looking at your networks, managing your different devices et cetera. What’s also a trend in the market is looking at your cyber threat from an outside-in perspective. There’s a lot of sources through social media, known ethical hacker communities and even some that aren’t, that are creating all sorts of different views and if you can aggregate that data from an external perspective and bring that data internal to the organization and mine it with your traditional cyber operations data, then you’re putting yourself in a position where you can be predictive, you can create different ways to prevent threat vectors that are going to come in based on what you’re seeing from the outside.

JR Reagan
Principal, Deloitte & Touche LLP
Chief Federal Innovation Officer

The next frontier in cyber is cyber analytics. There’s so much information out there that is untapped, that’s not being used. The trouble is we haven’t looked at the data outside our four walls. We’re really thinking that most of our insight is going to come from the things that we own. Frankly most of the insight is going to come from the data we don’t own and being able to associate that with the activities that may be happening in our own particular agency.

Amry Junaideen
Principal, Deloitte & Touche LLP
Leader, Federal Cyber and Technology Risk practices

We need to do advanced analytics, we need to do advanced forensics, we need to do advanced visualization so that we focus on the threats that matter the most to our mission operations.

I believe that the next generation of intrusion technology is basically almost simulating artificial intelligence environments, self-identifying, self-correcting and self-healing networks to squash that threat and then heal itself so that mission operations can continue without too much human intervention. Now that’s probably several years out but it’s a great aspiration for us.

Kevin Brault
One of our goals at the center is to try to show clients where the market is going. We find that it really helps us to unpack what the clients’ problems really are. It’s an environment where they can ask questions, they can see what other clients have gone through, other solutions on how we solve problems. We can talk about the art of the possible. We can help them set up where their budgets are going to be and their planning and help them really bring together a larger vision that they can take back to their enterprise and help sell to their leadership.

LTG Pete Cuviello, USA (Ret)
Director, Deloitte Consulting LLP
(Former Chief Information Officer, G6, US Army)

The real enabler in cyber operations of the future is bringing in the mission side. I’m not talking back-office business. I’m talking about what’s on the front burner now--costs, risk trade-offs, how much money to put against what, and where you get the biggest bang for the buck.

Mike Brown
As we look at the next generation of Cyber Center Operations, it’s really critical to look at the business end of it. How well does your organization fit into the organizational structure of the large organization you’re trying to protect? How is the information that you’re providing being received and perceived by the senior leaders in the organization? Are there cyber metrics available to show how effective and efficient you’re being and that, in fact, there’s a governance structure in place so that you bring in stakeholders that have a vested interest in what it is that you’re trying to do and protect.

I think these CISO communities are ready to take that on.

As used in this document, “Deloitte” means Deloitte & Touche LLP, which is a separate subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.

This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor.

Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this presentation.

Copyright © 2012 Deloitte Development LLC. All rights reserved.
Member of Deloitte Touche Tohmatsu Limited

Related links

Share this page

Email this Send to LinkedIn Send to Facebook Tweet this More sharing options

Stay connected