Can data overload in the IC be tamed?

By Mark Wisinger, senior analyst

In an era with more sensors and data than ever before, how can intelligence agencies separate the significant data from the background noise?

Data management is an enormous challenge right now in the Department of Defense and Intelligence Community, especially as the internet of things emerges onto the scene. The big data challenges are linked hand-in-hand with cloud implementation, insider threats and cybersecurity, business intelligence and traditional IT infrastructure.

This data management challenge is an opportunity for big data vendors, with defense and intelligence agencies looking to the private sector for solutions in data access and search, data labeling and filtering and other management needs.

Read more of this post

Change is coming to the intelligence community

mark-wisinger_65x85ic_013117By Mark Wisinger, senior analyst

Before President Trump entered office, there was widespread speculation on how he would change the intelligence community. Incoming administrations typically lean on intel agencies to get up to speed on security issues, yet this election cycle featured President Trump’s open criticism of the three letter agencies.

It’s safe to assume there will be a few changes in this space. Much of the tension and debate is beyond the scope of this blog, but I’ll break down two significant changes I’m predicting will shake things up for IT procurement.

Read more of this post

Key Takeaways from DoDIIS Worldwide Conference

Stephanie Meloni_65x85DoDIIS_081016By Stephanie Meloni, Consultant

The intelligence community (IC) isn’t using enough predictive analytics to stay ahead of threats, said senior government leaders at last week’s Department of Defense Intelligence Information Systems Worldwide Conference in Atlanta.

Senior DOD and IC leaders speaking at the conference pointed to several other key IT priorities for enhancing future operations, along with the challenges they face. Data integration and decision making, as well as cyber, were central to their strategies.

Read more of this post

%d bloggers like this: