Welcome!

Containers Expo Blog Authors: XebiaLabs Blog, Stackify Blog, Elizabeth White, Yeshim Deniz, Liz McMillan

Related Topics: @CloudExpo, Java IoT, Linux Containers, Containers Expo Blog, Log Management, @BigDataExpo

@CloudExpo: Article

Leveraging Cloud, Big Data and Mobility Initiatives

In the Boardroom with... Mr. John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services, U.S. Public Sector

John Felker is the Director, Cyber and Intelligence Strategy, at HP Enterprise Services, U.S. Public Sector. He works to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of the public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: Thank you for joining us today, John. Before we drill down into your perspectives on cybersecurity trends and the current threat landscape, please tell us about your background and your role at HP.

John Felker: Previous to HP, I served almost 30 years as a U.S. Coast Guard (USCG) officer involved in surface operations, international affairs, intelligence and cyber operations. The last seven years of my career in the USCG, I was the Executive Assistant to the Director of Coast Guard Intelligence, Commander of the Coast Guard Cryptologic Group, and Deputy Commander, Coast Guard Cyber Command. In these assignments the focus was on improving Coast Guard intelligence programs, cyber defenses, developing policy and programs for the connection of intelligence supporting cyber defense, and supporting the overall USCG mission. At HP, I currently work to develop cyber intelligence strategies to better integrate a broad range of cyber intelligence inputs to improve defensive cyber and business operation efforts, in direct support of our public sector and critical infrastructure industries.

SecuritySolutionsWatch.com: It is commonly stated by industry that today's security threats are more sophisticated than ever. Building walls and reacting to intrusions is no longer enough to keep your critical systems, data and assets secure. On HP.com, the company states that, "HP connects the science and technology of cybersecurity with industry-leading services, products, and solutions. We build in security upfront, so that our services secure the mission of our government clients - not just meet their need for enhanced information technology." Can you elaborate on how HP approaches its client's cybersecurity concerns?

John Felker: HP works hard with our customers to assess and understand their needs and their mission. As a premier provider of risk management and security intelligence solutions, HP enables a broad array of government, commercial enterprise and critical infrastructure enterprises throughout the world to mitigate cyber threats before they can cause harm. By leveraging our global presence, extensive experience and unique understanding of cybersecurity issues, both government and commercial enterprises are able to proactively and effectively meet their cybersecurity challenges, minimizing risks and mitigating threats.

HP has established a long successful history of cybersecurity knowledge, expertise and innovation in order to help our clients successfully:

  • Prepare, Identify, Detect and Disrupt cyber threats through in-depth threat analysis and management, along with comprehensive technologies specifically designed to directly mitigate increasingly sophisticated security attacks.
  • Manage enterprise risk, vulnerability, compliance, governance and operational maturity to proactively model the security control environment in a manner that specifically addresses threats, regulatory dynamics and business demands, across a harmonized control architecture.
  • Extend security, operational and business capabilities by embracing the New Style of IT to drive a more agile security program and enable the business - via secure cloud, mobility and Big Data - to leverage cost-effective delivery models and global presence.

HP takes an enterprise view of security that, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don't simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes.

By leveraging cloud, Big Data and mobility initiatives, you can evolve into a more proactive operating model that will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations.

SecuritySolutionsWatch.com: What is your perspective regarding any special cybersecurity considerations necessary to protect our nation's critical infrastructure? For example, recent headlines regarding the military style attack on a California nuclear power station suggest that our energy, transportation and water grids, are particularly vulnerable. What are your thoughts regarding these critical industries?

John Felker: The nation's critical infrastructures are mandated to meet their reliability and performance goals, in addition to effectively addressing the myriad of today's cyber threats. As the threat landscape continues to evolve, presenting new challenges daily, a constructive dialogue between the practitioners of cyber- and physical security needs to occur. On both sides of the responsibility equation there needs to be a recognition of the common areas of concern and increased levels of cooperation - not only for better overall defense, but to maximize allocated resources.

More and more, from a cyber-perspective, the critical infrastructure of our nation is at risk. Whether by nation-state actors, criminal organizations, hacktivists or any number of hackers looking to prove their skills, our country's safety and economic prosperity is threatened. In order to effectively address these evolving cybersecurity threats, there are four primary issues to consider:

  1. Becoming more proactive and dynamic in our cyber-defense efforts through the use of intelligence
  2. Better user behavior management
  3. Assessing risk using meaningful metrics and then conveying those threats in the language that clearly conveys business/mission impact; in essence, putting the information into terms that mean something to executive leadership
  4. Operating resiliently - always operational through any intrusion

In addition to addressing cyber threats, critical infrastructure owners must also harmonize security controls to meet current and emerging regulatory demands. At the end of the day, we must realize that the "systems" we use to operate and manage the elements of our critical infrastructure, are essentially "systems in motion" - that is, constantly changing and evolving. The industrial control systems that operate many aspects of critical infrastructure are now more effectively and economically managed through connection to the Internet, thus, exposing them to greater threat. Because of this exposure, we must become comfortable with the adversary in the "system" and take steps to defend, disrupt, mitigate and proactively create resilience.

SecuritySolutionsWatch.com: In working through such security issues, do you find that management personnel have the proper levels of threat assessment and threat intelligence in place?

John Felker: I believe there are many astute leaders who are beginning to recognize the importance of defending their networks in order to continue to conduct business, maintain operations even during times of intrusion or other disruptive events, and view cyber defense as a net positive. For example, in the electric utility industry, security programs, along with regulatory compliance and resilient operations, generate a huge amount of data that can be used to improve business efficiency as well as security. When you combine efficiency and security you have a powerful impetus to drive system improvement - and today this is generally done with only a "functional/tactical" level of intelligence in hand.

Looking broadly at potential threat actors in terms of their ability, desire and capacity to intrude, and to exploit and remove intellectual property, financial information and personally identifiable information is the next level of threat assessment and intelligence that leaders need to receive, but generally do not. So while management is getting what it needs in terms of daily defensive operations, it is not getting what it needs to make longer term business decisions related to security and risk assessment.

SecuritySolutionsWatch.com: What is your belief when it comes to the IT and operational decision-makers discussing mission strategy and cybersecurity solutions? In other words, do you believe the CIO and CEO truly speak the same language?

John Felker: Generally speaking, the CIO and network defenders talk in terms that relate directly to the network, while the CEO and business leadership tend to talk in terms of business outcomes and long-term strategy. These two lexicons do not necessarily intersect, causing disconnects in the business and budget planning process required to support cybersecurity efforts. At a broad level, an enterprise that understands the items that the CEO views as critical to the organization's mission and business processes is needed to develop a sound cybersecurity profile. Senior leaders must define their organizations' strategic requirements based on what assets and programs are of critical value to the business. Then they must evaluate threat actors - in terms of their motivations and how, based on those motivations, the threat actor may target the organization through cyber means. This understanding can then be used to support cybersecurity priorities over time.

SecuritySolutionsWatch.com: Thank you again for joining us today, John. We appreciate the insights you have shared with us today.

This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.

More Stories By Liz McMillan

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
SYS-CON Events announced today that Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. The company co-innovates with customers and partners to deliver automated, scalable and secure network...
The age of Digital Disruption is evolving into the next era – Digital Cohesion, an age in which applications securely self-assemble and deliver predictive services that continuously adapt to user behavior. Information from devices, sensors and applications around us will drive services seamlessly across mobile and fixed devices/infrastructure. This evolution is happening now in software defined services and secure networking. Four key drivers – Performance, Economics, Interoperability and Trust ...
Five years ago development was seen as a dead-end career, now it’s anything but – with an explosion in mobile and IoT initiatives increasing the demand for skilled engineers. But apart from having a ready supply of great coders, what constitutes true ‘DevOps Royalty’? It’ll be the ability to craft resilient architectures, supportability, security everywhere across the software lifecycle. In his keynote at @DevOpsSummit at 20th Cloud Expo, Jeffrey Scheaffer, GM and SVP, Continuous Delivery Busin...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deli...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists will examine how DevOps helps to meet th...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Analytic. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
SYS-CON Events announced today that T-Mobile will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on ...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
@ThingsExpo has been named the Most Influential ‘Smart Cities - IIoT' Account and @BigDataExpo has been named fourteenth by Right Relevance (RR), which provides curated information and intelligence on approximately 50,000 topics. In addition, Right Relevance provides an Insights offering that combines the above Topics and Influencers information with real time conversations to provide actionable intelligence with visualizations to enable decision making. The Insights service is applicable to eve...
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.