Mature Models for Healthy and Resilient Cyber Systems

In February 2011 we reported on a Department of Homeland Security research agenda for cyber security, providing the opinion that this was “the most mature research agenda on the topic of cyber security.” That research agenda is fantastic and should help shape the future cyber ecosystem in very positive ways.

Now in March 2011, DHS has produced another significant, positive, virtuous document on the topic of Cybersecurity that deserves the attention of leaders, planners and technologists from across the country. They have given us a white paper titled “Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action.” This paper flows from discussion, dialog and workshops that collegially fleshed out concepts. It is well worth a read and should help us all move towards a better IT environment.

Things I liked about this paper:

  • It is collegial. It is not about “command and control,” it is about vision and collaboration.
  • It uses relevant models for complex systems like modern IT. Relevant models, like those based on life, can really help in our understanding of how to design for success.
  • It is well written, so it is easy to follow and fast to read
  • It focuses on the most critical threats, in my opinion. With no hype or hyperbole, it spells out clearly what the threat is and why we must rise to mitigate it.
  • It articulates “Resiliency,” an important emerging way of descirbing the state we need in IT that realizes attacks will always be with us.
  • It simply describes and moves out on concepts of healthy devices, strong authentication, automation, and interoperability.

I hope that has been enough to grab your interest. I think the authors would like your review and would appreciate your feedback. They are clearly writers and thinkers with open minds, and the document contains contact information you can use to connect with them.

You can also read context by Phil Reitinger (Deputy Under Secretary, National Protection and Programs Directorate) on the DHS blog at: http://blog.dhs.gov/2011/03/enabling-distributed-security-in.html

Related articles

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.

 

Recent Research

Tech Firms Seeking To Serve Federal Missions: Here is how to follow the money

Creating The New Cyber Warrior: Eight South Carolina Universities Compete

Mobile Gamers: Fun-Seeking but Fickle

Update from DIA CTO, CIO and Chief Engineer on ICITE and Enterprise Apps

Pew Report: Increasing Technology Use among Seniors

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

Watch For More Product Feature Enhancements for Actifio Following $100M Funding Round

Navy Information Dominance Corps: IT still searching for the right governance model

DISA Provides A milCloud Overview: Looks like progress, but watch for two big risks

Innovators, Integrators and Tech Vendors: Here is what the government hopes they will buy from you in 2015

solid
About Bob Gourley

Bob Gourley is the publisher of CTOvision.com and DelphiBrief.com and the new analysis focused Analyst One Bob's background is as an all source intelligence analyst and an enterprise CTO. Find him on Twitter at @BobGourley