Governance , Next-Generation Technologies & Secure Development

The Need for Cyber ISR

Tenable's Christopher Cleary on How Enterprises Will Benefit from Military Strategy
The Need for Cyber ISR
Christopher Cleary, Tenable Network Security

It's a tried and true military tradition: ISR, or Intelligence, Surveillance and Reconnaissance. But the practice is gaining traction in enterprises as well, and especially within cybersecurity, says Christopher Cleary of Tenable Network Security.

What is the compelling need for Cyber ISR?

"The concept of Intelligence, Surveillance and Reconnaissance is not new. It's a concept that's been floating around the department of defense for a long time, and there are guys that spend their whole careers working in the field of ISR," says Cleary, Director of Federal Business Development at Tenable. "[But] there are a lot of military applications that eventually found their way into commercial applications, and I believe this is one of them."

In an interview about Cyber ISR, Cleary discusses:

  • Why the ISR approach is now needed in organizations;
  • The culture clash that currently exists in many groups;
  • The tools and skills necessary for an ISR practice.

Cleary is a recognized expert in the field of computer network operations and has been a true trailblazer in both the commercial security world and the Navy´s Information Dominance Community. He is currently the Director of Business Development and Federal Cyber Strategy for Tenable Network Security, based in Columbia, Maryland. His commercial experience prior to joining Tenable includes Client Partner with Verizon Enterprise Solutions, Director of Cyber Intelligence, L3 Communications, President, Vir-Sec Government Services, and Senior Manager of Intelligence Programs, Sparta. He is also a Commander in the Navy Reserves, where he spent 16 of 24 years on active duty supporting a variety of commands including US CYBER COMMAND, National Security Agency, Office of Naval Intelligence, National Reconnaissance Office and Joint Special Operations Command. He has deployed four times, twice supporting combat operations in Iraq.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.