The Evolution of Cyber Trust in Intelligence Agencies

Bringing together leaders, lawmakers and lawbreakers. Host Luke Fox explores how innovations in business and technology are redefining our trust in security measures.

 

The idea of trust is much different than it was in the previous centuries. It’s no longer just about people; it includes technology as well. The Trust Revolution tackles this subject with a wide-ranging interview with Maj. General Jim Poss. Poss is a 30-year U.S. Air Force Veteran with combat experience as well as being a part of the intelligence community. He’s now CEO of ISR Ideas, an intelligence and drone consulting firm.

“The internet was created to be something unkillable, not something that was trustworthy. All the security has been strapped onto it. It’s a system that wasn’t designed with trust as a core operating principle.” -Maj. General Jim Poss

Host Luke Fox first asked Poss about the idea of trust in the military, intelligence, and government applications. “Trust is transient and has to be earned. In the military, the biggest trust revolution was revealing everything to allies in WW II, which lead to NATO. NATO is a military body, but it also has the role of maintaining trust between western militaries.”

The conversation shifted to intelligence agency trust and cyber trust. “Access is a concern. Agencies are hard on the outside, squishy on the inside. Before there wasn’t enough auditing or the firm ‘need to know’ system we have now,” Poss said.

In diving deeper into technology, Poss spoke about trust with the internet. “The internet was created to be something unkillable, not something that was trustworthy. All the security has been strapped onto it. It’s a system that wasn’t designed with trust as a core operating principle.”

In the early days of the internet, the boundaries were blurred around access and security. Poss said there was an “Alamo” approach to cybersecurity with physical segregation. It wasn’t effective, as there were unsecure portals to the outside world. “We’ll never be able to make the whole thing secure, but part of it should be, and banks are a good example,” he added.

The focus now is on layered trust; trust but verify and audit. Trust between technology and humans will continue to evolve. However, technology is only as trustworthy as the intent behind by humans.

Catch Up On Previous Episodes of The Trust Revolution!

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

Next generation of security solutions
The Future of Security: Discovering the Next Generation of Security Solutions at ISC West
April 23, 2024

The recently concluded International Security Conference & Exposition West 2024 (ISC West) proved to be an indispensable platform for discovering the next generation of security solutions, providing attendees with invaluable insights into the future of the industry. At a recent episode of MarketScale’s roundtable show Experts Talk, Cathal Walsh, Vice President and Chief Security […]

Read More
Cyber Resilience: To Protect Corporate Assets, Businesses Must Invest in Cybersecurity Training
April 23, 2024

As cyberattacks occur at increasing frequency, cybersecurity has become a cornerstone of corporate security strategies across all sectors. With businesses increasingly reliant on digital infrastructures, the quality of a company’s cybersecurity training is no longer just an operational requirement — it is a strategic asset. The stakes are high, as a breach can lead […]

Read More
Forming Relationships with Industry Insiders Can Quell Sales Cycles and their Length of Time
April 23, 2024

New companies are facing more and more challenges in the security industry as sales cycles are experiencing lengthier times. One of those reasons is due to the complexity of the security industry itself, along with the unique and special business models every new company will come in with. But there is a solution to […]

Read More
Cyber-first approach
From Bollards to Bytes: Why Security Firms Need to Adopt a Cyber-First Approach
April 23, 2024

How can the security industry effectively navigate the shift from traditional physical security measures to adopting a cyber-first approach in its sales and integration strategies? The transition from physical to digital security solutions was a major theme at the International Security Conference & Exposition West 2024 held earlier this month. On a recent episode of […]

Read More