Innovation in Government: Adapting Intelligence for Emerging Threats

Original broadcast 10/7


Presented by Carahsoft

The latest Innovation in Government program, recorded at the AFCEA and INSA Intelligence and National Security Summit, brings together leaders from government and industry to discuss how the intelligence community is adapting to new technologies, managing evolving threats, and strengthening public-private partnerships. The conversations cover topics ranging from cyber hygiene and zero trust, to the professionalization of open-source intelligence, to supply chain resilience and the modernization of the defense industrial base.

Industry Partnerships and Mission Outcomes

Screenshot 2025-10-01 at 10.21.00 PMMichael Shrader, Vice President of Carahsoft, emphasized the intelligence community’s long-standing shift toward buy versus build in technology adoption. Agencies are increasingly relying on industry’s cutting-edge solutions—particularly in emerging technologies—so they can stay focused on mission outcomes. Shrader highlighted the growing importance of open-source intelligence, with industry playing a key role in providing sensor data, analysis, and near-finished intelligence.

Artificial intelligence is not being discussed abstractly, he noted, but rather in mission-specific terms: using AI to accelerate analytics, reduce decision cycles, and save lives. Looking ahead, Shrader pointed to the China threat and the race for technological dominance in AI and quantum as central challenges for the intelligence community.

Key Takeaways

  • Agencies are deepening reliance on industry innovation to stay mission-focused.

  • OSINT and AI are central to decision speed and mission effectiveness.

  • Maintaining technological dominance over China remains the top long-term priority.

Low-Cost Cybersecurity and Critical Infrastructure Protection

Screenshot 2025-10-01 at 10.21.41 PMJermaine Roebuck, Associate Director for Threat Hunting at CISA, discussed the pressing need for basic cyber hygiene, especially in critical infrastructure sectors such as water and energy. Even low-cost measures—like changing default passwords, restricting operational technology systems from internet exposure, and using phishing-resistant multi-factor authentication—can dramatically improve security.

He emphasized that the biggest barrier is not resources, but awareness: OT engineers and technicians often prioritize convenience over cybersecurity. Roebuck urged greater education and direct outreach, including CISA’s regional engagements and the agency’s Cyber Performance Goals. He warned that ransomware and hacktivist threats are increasingly targeting utilities, while sophisticated nation-state actors lie in wait to hold infrastructure at risk.

Key Takeaways

  • Simple, low-cost cyber hygiene practices can stop many threats.

  • Awareness and education for OT engineers are critical to progress.

  • Hacktivists, ransomware actors, and nation-states each present distinct risks.

Innovation Through Public-Private Partnerships

Screenshot 2025-10-01 at 10.22.20 PMJanel Balch, Major Account Manager in the National Security Group at Dell Technologies, described the value of government-led public-private partnerships. Success depends on transparent, bi-directional communication, with government providing clear problem statements and industry offering innovative, secure solutions.

She noted that industry sometimes surprises agencies with capabilities they didn’t know existed. To prevent gaps, she advocated for institutionalized roles and processes that maintain continuity beyond personal relationships. Balch also highlighted the need for cleaner, clearer contracting processes to accelerate innovation.

Key Takeaways

  • Government-led partnerships create stronger alignment between needs and solutions.

  • Transparency and problem statements drive effective collaboration.

  • Institutionalized innovation roles prevent reliance on personal relationships alone.

Professionalizing Open Source Intelligence

Screenshot 2025-10-01 at 10.23.15 PMDennis Eger, Senior Open Source Intelligence Advisor for the U.S. Army, explained the Army’s approach to treating OSINT as the “intelligence of first resort.” Once dismissed as anyone’s skill, OSINT is now recognized as a professional discipline requiring tradecraft, training, and certification.

He highlighted the Army’s OSINT Strategy (2022–2030), the first of its kind in the intelligence community, which has already delivered 80 percent of its objectives. This strategy has driven cultural change within Army Intelligence, ensuring OSINT informs and synchronizes with other intelligence disciplines.

Key Takeaways

  • The Army views OSINT as a foundational discipline requiring professional tradecraft.

  • The 2022 OSINT Strategy has transformed Army Intelligence culture and practice.

  • OSINT provides speed, volume, and breadth of information to inform other disciplines.

Future Risks in Intelligence

Screenshot 2025-10-01 at 10.29.58 PMKile Sears, Strategic Partner at Semantic Visions, identified three emerging intelligence risks: synthetic media, state-criminal convergence, and supply chain vulnerabilities. He stressed the importance of multilingual OSINT collection to detect early warning signals, citing how delays in language coverage can distort narratives.

Sears emphasized the growing role of AI-enabled multilingual models that curate data across languages, reducing analyst workload and improving accuracy. Synthetic media, he warned, will continue to escalate as adversaries weaponize generative AI.

Key Takeaways

  • Synthetic media poses an immediate OSINT challenge.

  • Multilingual AI models are transforming OSINT by curating global data.

  • Supply chain intelligence is essential for resilience and security.

Coalition Intelligence and Information Sharing

Screenshot 2025-10-01 at 10.33.33 PMTom Sweatman, Vice President of Janes Americas, underscored the value of OSINT for coalition intelligence because it is unclassified and easily shareable. He explained that effective information sharing is often hampered by governance, standards, and uncertainty over what can be shared.

Sweatman argued that leveraging commercial OSINT capabilities is essential, enabling government agencies to focus on priority missions while industry monitors the broader global landscape. He also stressed the importance of preventing duplication in procurement, echoing NGA Director Vice Admiral Whitworth’s push for efficiency.

Key Takeaways

  • OSINT enables unclassified, coalition-wide intelligence sharing.

  • Industry capabilities can fill gaps where government capacity is limited.

  • Collaboration and efficiency in procurement are key to success.

Modernizing the Guard’s IT and Zero Trust Journey

Screenshot 2025-10-01 at 10.33.54 PMKenneth McNeill, Chief Information Officer of the National Guard Bureau, described the Guard’s unique IT challenges across 54 states and territories. With 93 percent of personnel lacking government-furnished devices, the Guard pioneered a Bring Your Own Device program that has since been adopted DoD-wide.

He emphasized the Guard’s enterprise-level zero trust plan, designed to protect the DODIN and align with the broader Department of Defense. Collaboration with Army and Air Force CIOs ensures innovation, while retaining cyber talent remains a top priority.

Key Takeaways

  • BYOD transformed Guard operations and has influenced the entire DoD.

  • The Guard has its own enterprise zero trust plan to secure operations.

  • Retaining cyber workforce skills is a key challenge for future readiness.

OSINT in Threat Management and Executive Protection

Screenshot 2025-10-01 at 10.34.24 PMSean Underwood, Vice President of Government at ShadowDragon, discussed the growing use of OSINT in executive protection and threat management. Analysts must sort through massive amounts of tips and alerts, often across hundreds of online sources. Threat actors frequently operate under multiple aliases, making cross-platform analysis critical.

He noted that effective threat management combines OSINT tools with human judgment, factoring in proximity, weapons access, and behavioral patterns. Social media fragmentation, including into smaller platforms like Mastodon servers, has made the collection challenge more complex.

Key Takeaways

  • OSINT is increasingly vital in executive protection and threat management.

  • Threat actors operate across multiple platforms, requiring cross-source analysis.

  • Effective assessment blends technology with human expertise in risk evaluation.

Reimagining the Defense Industrial Base

Screenshot 2025-10-01 at 10.35.01 PMA.J. Bertone, Managing Partner at In-Q-Tel, argued that today’s defense industrial base was built for yesterday’s wars and is unprepared for tomorrow’s. Rapid technological change and evolving threats demand a reimagined base that is agile, resilient, and sustainable.

He pointed to reforms easing the path for private companies to work with government, but emphasized that cultural and practice-based changes remain harder. A resilient defense industrial base, he stressed, requires sustainable supply chains, secure stockpiles, and reduced dependence on adversary-linked inputs.

Key Takeaways

  • The defense industrial base must adapt to rapid tech evolution and new threats.

  • Policy reforms are helping, but cultural and practice changes are harder.

  • Supply chain resilience and sustainability are central to future readiness.


 

Join our Newsletter

Please fill out the requested information below