Cyber Intel Employs Risk Approach

Being Reactive Is No Longer an Acceptable Practice
Harry Raduege sees the nascent field of cyber intelligence as a way for governments and businesses to be proactive, and not reactive, to today's sophisticated digital threats."We have been for years reactive to the threats, the vulnerabilities, the impact that outside intruders are introducing into our networks, but the losses are becoming so severe ... that no longer is it acceptable to just react to the event after it happened," Raduege, chairman of the Deloitte Center for Cyber Innovation, says in an interview with Information Security Media Group (select one of the Podcast Options at right to listen).

"We really need to take this proactive approach in being able to decide and determine and take action before hand to mitigate these risks that are coming at us," says the retired three-star Air Force general who once ran the Defense Information Systems Agency.

Raduege, in the interview:

  • Defines cyber intelligence.
  • Discusses the four approaches to cyber intelligence that incorporate cybersecurity, analytics, forensics and logistics.
  • Explains how cyber intelligence adopts an information risk management approach in safeguarding a organization's business and mission.

Raduege served in the military for 35 years, retiring as an Air Force lieutenant general. At his retirement, he was director of the Defense Information Systems Agency. Prior to his DISA assignment, Raduege directed command and control systems for North American Aerospace Defense Command, U.S. Space Command and Air Force Space Command. He also served as the chief information officer for all three commands as well as the architect for computer network defense and attack capabilities established within the Department of Defense. He also serves as co-chair of the Commission on Cybersecurity for the 44th Presidency, which three years ago proposed steps the new administration should take to secure the federal government's and nation's critical IT systems.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.