is a Business Development Executive for Raytheon Information, Intelligence and Services (IIS). Raytheon Company (NTSE: RTN), with 2015 sales of $23 billion and 61,000 employees worldwide, is a technology and innovation leader specializing in defense, security and civil markets throughout the world. Raytheon is headquartered in Waltham, Mass.
IIS is a leader in intelligence, surveillance and reconnaissance; advanced cyber solutions; weather and environmental solutions; information-based solutions for law enforcement and homeland security; and training, logistics, engineering, product support, and operational support services and solutions for Mission Support, homeland security, space, civil aviation, counter-proliferation and counterterrorism.
Kershaw leads several international business Cyber development initiatives and is responsible for expanding international opportunities for IIS’s products and solutions. He coordinates with other Raytheon businesses for international and domestic efficiencies.
Prior to joining Raytheon in 2014, Kershaw retired as a Captain after 28-years in the United States Navy. He was most recently Commanding Officer of Navy Information Operations Command Hawaii and Commander, Task Force 1070. During most of his career, he has worked closely with various National Security Agency offices.
Kershaw earned his Bachelor’s degree in International Affairs from The George Washington University, a Master’s Degree in National Security Affairs from the Naval Postgraduate School in Monterey, California. He is a three time graduate of the Defense Language Institute obtaining certification in Russian, Hebrew and Dari.
Contextualizing Threat Intelligence
There is a gap in the traditional approach of applying threat intelligence to enterprise security. Corporations typically do not have the manpower to process intelligence feeds and apply associated controls across their business units and information assets. New approaches enable the ingestion of hundreds of distinct threat feeds, normalization of the feeds, and most importantly, the ability to provide context, including: current status of threats, applicability to the client industry, trustworthiness, impact if exposed, and related indicators of compromise (e.g. file hashes, URLs, IP addresses, domains, email headers). Machine learning provides the foundation to intelligently interrogate client security infrastructure, correlate this information with external intelligence, and identify both known and unknown threats.