This podcast is brought to you by The Chertoff Group; sharing unique insights and perspectives on security, technology, and policy; helping organizations manage risk and accelerate growth.
…
continue reading
The use of disinformation isn’t new, but finding the truth has become more challenging as our adversaries employ sophisticated tools to manipulate perception. The Chertoff Group’s Adam Isles speaks with national security expert J.D. Maddox about the nature of disinformation campaigns, why companies should be concerned, and what can be done to preve…
…
continue reading
While cybersecurity is often top of mind for many companies, physical threats such as active shooters are emerging as major risks to people and businesses too. The Chertoff Group’s Jayson Ahern discusses the roles and responsibilities of leadership in guarding against these threats, how chief security officers can work with the organization, and ho…
…
continue reading
Chertoff Group Senior Advisor Bob Pocica, who began his career at the FBI and served in various security roles at major corporations, discusses enterprise risk management. He talks about the importance of bringing physical and cybersecurity areas of a company together, and why it’s necessary for organizations to have a senior individual in charge o…
…
continue reading

1
061 From the Wild Blue Yonder to the Corporate World
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42The Chertoff Group’s Brian Hess traces his career in the U.S. Air Force – from deployment to his work at the Pentagon as a Nuclear Security Policy Officer. He discusses how the lessons he learned in the military can apply to the corporate world. How can we break down the barriers that exist between physical and cyber within organizations? He stress…
…
continue reading
What is the state of the market when it comes to space and missile defence? The Chertoff Group’s Kristjan Kornmayer, who recently published the Space and Missile Defense Market Review, discusses a recent space and missile defence symposium and where he sees major areas of investment from the government and private sector.…
…
continue reading
Maggie Brunner of the National Governors Association discusses the steps that states are taking when it comes to cybersecurity. It’s everything from ensuring election security, dealing with ransomware threats, to protecting the electric grid. She highlights an innovative pilot program with seven states to improve cybersecurity, as well as the Natio…
…
continue reading

1
058 Threats Along the Way: Securing the International Supply Chain
16:34
16:34
Play later
Play later
Lists
Like
Liked
16:34The Chertoff Group’s Jayson Ahern talks about the importance of international supply chain security, and the delicate balance that must be maintained to keep goods flowing across our border. Public-private partnerships are setting standards to ensure legitimate goods come in, and the threats stay out. He discusses why companies need to understand –…
…
continue reading

1
057 Wanted: Director of National Intelligence
14:17
14:17
Play later
Play later
Lists
Like
Liked
14:17What makes a good Director of National Intelligence? In the wake of the recent retirement of National Intelligence Director Dan Coats and the resignation of principal deputy director Sue Gordon, Chertoff Group Principal Charles Allen discusses what the Office of the Director of National Intelligence means to the security of the United States. Allen…
…
continue reading

1
056 18 Years Later: The State of Homeland Security
9:32
9:32
Play later
Play later
Lists
Like
Liked
9:32The Senate Homeland Security and Government Affairs Committee reflected on today’s national security challenges during a recent hearing titled “18 Years Later: The state of Homeland Security After 9/11.” Chertoff Group Executive Chairman Michael Chertoff, who served as the second U.S. Homeland Security Secretary, testified about the collective work…
…
continue reading

1
055 ‘After That Moment, Things Would Never Be the Same:’ Reflections on 9/11
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03It’s been nearly 20 years since the terrorist attacks of September 11, 2001. The Chertoff Group’s Jayson Ahern, Charles Allen, Adam Isles, General Michael Hayden, and Lee Kair reflect on a day that changed America, and share stories about how it influenced their careers. They had a front-row seat to what happened on one of the country’s darkest day…
…
continue reading
How can the U.S. ensure the security of its elections and protect democracy? The Chertoff Group’s Adam Isles discusses vulnerabilities in election security and strategies to guard against attacks with Philip Reitinger, president and CEO of the Global Cyber Alliance. Reitinger talks about some basic steps to cut your cyber risk and cautions that the…
…
continue reading
Attacks on the U.S. election system and those around the world are designed to sow doubt and undermine confidence, creating challenges for democracies around the world. Adam Isles and Michael Chertoff discuss how we protect the integrity of elections – from campaigns, voters, and the voting system itself. It requires a public-private partnership, a…
…
continue reading
Artificial Intelligence (AI) is the ability of computer systems and algorithms to simulate human responses and then learn and adapt. It holds great potential to bring innovation across a number of sectors. But it also raises a host of moral, legal and ethical questions. The Chertoff Group’s Paul Rosenzweig discusses the challenges and dilemmas this…
…
continue reading
Software has traditionally been a black box when it comes to knowing what’s inside. Allan Friedman, director of Cybersecurity Initiatives at the National Telecommunications and Information Administration, discusses the Software Component Transparency initiative and efforts to establish a software bill of materials. It’s akin to a list of ingredient…
…
continue reading

1
050 A Turning Point for Artificial Intelligence
23:17
23:17
Play later
Play later
Lists
Like
Liked
23:17Artificial Intelligence (AI) is an incredibly powerful tool to help us make predictions, offering the promise of huge advances across all economic sectors and the government. But how do we define AI, what are its benefits, and how can it be applied in a way that’s consistent with our values? Carol Kuntz, a senior advisor with the Chertoff Group, di…
…
continue reading

1
049 Guarding the Nation’s Critical Infrastructure
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16The electric grid is often described as a lifeline sector for the nation’s critical infrastructure. But most of this sector is privately owned. How can the government and private sector work together to protect the nation’s critical infrastructure? The Chertoff Group’s Scott Gibson and Christian Healion discuss the new Cybersecurity and Infrastruct…
…
continue reading
Encryption is a foundational security tool. But in a time of more outbreaks of violence, the temptation is great to build a backdoor into the encryption process and foil plots before they can be carried out. Chertoff Group Co-Founder and Executive Chairman Michael Chertoff argues that we shouldn’t weaken encryption for an understandable – yet narro…
…
continue reading

1
047 Keeping the Pedal to the Metal on Security Clearance Transformation
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41Under a new Executive Order, the security clearance process will now be conducted through the Department of Defense. It’s an important step forward in reforming the outmoded and cumbersome security clearance process. But it’s not a panacea say Chertoff Group Principal Charles Allen, Chuck Alsup, President of the Intelligence and National Security A…
…
continue reading
Cyber threats now rank as the number one threat against U.S. government and business interests. What can the government do to protect businesses against an onslaught of attacks? The Chertoff Group’s Adam Isles and Matthew Eggers of the U.S. Chamber of Commerce discuss the Cyber SAFETY Act – proposed legislation that would modernize an early law put…
…
continue reading

1
045 The Weakest Link? Managing Third-Party Risk
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54A changing business environment has meant that many companies outsource services and have multiple supply chains, introducing new risks from the outside. The Chertoff Group’s Chris Duvall talks about ways to manage third-party risk, the questions companies should be asking, and the looming threat of software subversion. He advises organizations to …
…
continue reading
Organizations are facing increased cybersecurity threats. How should companies assess these risks and put a plan in place to prevent them? The Chertoff Group’s Adam Isles and Kurt Alaybeyoglu discuss MITRE’s ATT&CK threat assessment model that helps companies create individual plans to better understand risks, threats and ways to guard against them…
…
continue reading

1
043 Security Risk Management: Are Businesses Making the Right Investments?
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33There’s no such thing as risk elimination. But if businesses focus on the most likely threats, they can minimize the damage. The Chertoff Group’s Adam Isles and Scott Gibson talk about how organizations can manage security risks effectively, the importance of monitoring those risks, and the convergence of both physical and cybersecurity threats.…
…
continue reading
A brief note to our listeners: Our “Global Threats” podcast was originally recorded on May 3, 2019. Since that time, additional events have occurred involving the regions we discuss on the podcast. Geopolitical realities can present risks for companies. The Chertoff Group’s Jonathan Paris, an expert in Middle East, US-China and transatlantic relati…
…
continue reading
How can technology play a role in modernizing the security clearance process? Allan Martin, co-founder and CEO of Lumina Analytics, speaks about how we move from an outmoded system that is manually based to one that is far more focused on technology. He discusses how the use of artificial intelligence could make the process more efficient and why c…
…
continue reading
Private companies are collecting an enormous amount of data about us. What’s being collected, who is sharing it, and why? Privacy expert Justin Antonipillai, CEO of WireWheel, talks about the data that online retailers are collecting and buying about customers and how this information can be used. He discusses the steps that companies should take w…
…
continue reading

1
040 Protecting the Nation’s Critical Infrastructure
20:50
20:50
Play later
Play later
Lists
Like
Liked
20:50How can we protect the nation’s critical infrastructure from both physical and cyber attacks? Brian Harrell, the first Assistant Director for Infrastructure Security within the U.S. Cybersecurity and Infrastructure Security Agency (CISA), discusses how “soft” targets – from schools to stadiums and places of worship – can be protected. He talks abou…
…
continue reading
What is quantum computing and how might this disruptive technology change our lives? Paul Stimers, a partner at the law firm K&L Gates and founder of the Quantum Industry Coalition, talks about how the U.S. can encourage innovation in the field – or risk losing out to international competitors. He notes the importance that workforce development wil…
…
continue reading

1
038 Beyond Big Brother: Dealing with Insider Risks
21:35
21:35
Play later
Play later
Lists
Like
Liked
21:35Sometimes, the greatest risks to a company come from the inside. The Chertoff Group’s Lee Kair and Sean Horner discuss insider risk, why it happens and what can be done to identify and mitigate those risks. They stress the importance of continually monitoring behaviors that can indicate a red flag. And they offer insights on how a robust insider th…
…
continue reading
The impending shift to Fifth Generation Wireless - 5G – will dramatically reshape almost all aspects of our lives. Its effects will impact all industries and it’s expected to herald unprecedented innovation. Cyber security experts Sam Visner and John Nagengast, members of the Intelligence and National Security Alliance’s Cyber Council, discuss how …
…
continue reading

1
036 Inside the Tactical Advances between Cybercriminals and Security Industry
25:22
25:22
Play later
Play later
Lists
Like
Liked
25:22Cybercriminals are escalating the cyber arms race with pace and determination. Cybersecurity expert Bill Conner, president and CEO of SonicWall, helps us explore the tactical advances by both the security industry and cybercriminals. Conner discusses the 2018 SonicWall Cyber Threat Report, which details more than 10.5 billion global malware attacks…
…
continue reading
A common language is needed around cyber threats, says Jim Richberg, former National Intelligence Manager for Cyber and advisor to the Director of National Intelligence on cyber issues. He talks about how to turn cyber intelligence into actionable information. Lacking good metrics is the “greatest Achilles’ heel of cybersecurity,” he says. He cauti…
…
continue reading
Our devices are increasingly connected through the Internet of Things (IoT). What are the emerging risks associated with this connectivity? Adam Isles, a principal at The Chertoff Group, shares insights about the IoT environment and the need for standards in this space. He calls for security standards to be seamlessly integrated into the software d…
…
continue reading

1
033 Making Blockchain and Cryptocurrency Less Cryptic
28:18
28:18
Play later
Play later
Lists
Like
Liked
28:18What is blockchain technology and how is it applied? Alan Cohn, a blockchain and cryptocurrency expert with Steptoe, explains the ins and outs of blockchain, its strengths as a security technology, and the landscape for oversight and regulation. He discusses blockchain’s potential and how companies are using it to innovate.…
…
continue reading
Which laws govern data in cyberspace and how do these issues evolve when conflicts happen? Chris Painter, a globally recognized leader in cybersecurity and cyber policy, discusses how governments can work together to drive good behavior online and set norms. Although we’re not yet at a stage where we have a United Nations treaty for cyberspace, Pai…
…
continue reading
Reputational hits can cost a company and damage a business. What’s the role of business intelligence and due diligence when it comes to mitigating risk? The Chertoff Group’s Ben Joelson and Brogan Ingstad discuss the evolution of how companies have managed risk and the steps that should be taken – from mining open-source intelligence sources to nav…
…
continue reading

1
030 Preparing for Cyber-Enabled Economic Warfare
21:11
21:11
Play later
Play later
Lists
Like
Liked
21:11A cyber-enabled economic warfare (CEEW) attack designed to undermine America’s strength would have far-reaching strategic and economic consequences. Should such an attack occur, how would the U.S. government and private sector respond and what would they ask and expect of each other in the immediate aftermath? Dr. Samantha Ravich, chairman of the F…
…
continue reading

1
029 Emerging Trends for Physical Security
26:36
26:36
Play later
Play later
Lists
Like
Liked
26:36We often focus on cybersecurity, but physical security is just as important. How do companies take the lessons learned from organizations that have experienced tragedies and implement them to keep employees safe? The Chertoff Group’s Ben Joelson and Scott Gibson discuss technologies that could be part of the solution, and what happens when physical…
…
continue reading
What happens in the first 24 hours after an organization experiences a crisis? Siobhan Gorman, a partner at the Brunswick Group, talks about the playbook that every organization should have in place before an incident occurs. She discusses the implications for both internal and external communications, how to involve the CEO, and the role of social…
…
continue reading

1
027 Not-So-Friendly Skies: Protecting Against Drone Threats
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Drones have become ubiquitous for a number of commercial and consumer purposes. But what happens when drones land in the wrong hands? The Chertoff Group’s Ben Joelson and Phil Pitsky Vice President of Federal Operations for airspace security company Dedrone discuss the challenges and threats that drones can pose and what can be done under current l…
…
continue reading

1
026 Reforming the Security Clearance Process
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07The current security clearance process is antiquated and should be modernized. Chuck Alsup, President of the Intelligence and National Security Alliance (INSA), and Chertoff Group Principal Charles Allen, discuss the growing momentum to reform the security clearance process. They talk about how the government and private sector can work together on…
…
continue reading

1
025 Cybersecurity: Why is This (Still) So Hard?
28:43
28:43
Play later
Play later
Lists
Like
Liked
28:43As General Michael Hayden continues his recovery at home, please enjoy his recent thoughts on private and public sector approaches to cybersecurity and information sharing as part of our latest Insights & Intelligence podcast. He chats about some of the thorniest issues facing the United States, such as Russian interference in our elections, and ho…
…
continue reading
There are two types of companies – those that have experienced a #databreach and those that don’t know they have. As the amount of data breaches affecting the private sector has reached epidemic proportions, former FBI Executive Assistant Director Bob Anderson details the questions #CEOs should be asking to avoid an attack and what to do if a breac…
…
continue reading

1
023 Securing Foreign Investment Gets a Reboot
27:48
27:48
Play later
Play later
Lists
Like
Liked
27:48Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the purpose of the Committee on Foreign Investment in the United States (CFIUS), how it works and how we can encourage foreign investment without compromising security. He highlights some changes in the law that every company doing business in the United States should know.…
…
continue reading
When it comes to terrorist attacks, some of the biggest threats to security involve soft targets – airports, concert venues and nightclubs. Dr. J. Bennet Waters, who leads The Chertoff Group’s global Strategic Advisory Services, discusses ways to manage risk, be aware of threats and balance security with privacy with civil liberties. Keeping ahead …
…
continue reading

1
020 Putting Security in the Driver’s Seat
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09How can security be embedded in the technologies used in automobiles? Fay Francy, executive director of the Automotive Information Sharing and Analysis Center (Auto-ISAC), discusses how the auto industry is working together to make sure the software used in cars is safe and secure.By Katy Montgomery
…
continue reading
Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Corman previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, & strategy roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new…
…
continue reading

1
018 A Prescription for Security in Digital Health
27:19
27:19
Play later
Play later
Lists
Like
Liked
27:19From insertable cardiac monitors to medical devices connected to smartphones, healthcare has become more responsive to patients. Abbott’s Chris Tyberg and Chertoff Group Principal Bennet Waters discuss technological advances in digital health and the role that cybersecurity plays in this new healthcare frontier. They share insights from a new study…
…
continue reading
What do organizations need to know to effectively manage security when moving to the cloud? Delta Risk CEO Scott Kaine walks us through important considerations such as identifying what you already have in the cloud, ensuring the environment is configured correctly, and determining who has access. He stresses the need to triage what’s important whe…
…
continue reading
While biometric technologies have been around for a long time, we’re now starting to see them in our day-to-day lives. From iris and fingerprint scans to facial recognition software, Lee Kair, managing director at The Chertoff Group, breaks down what we need to know about biometrics. Kair, an expert in aviation and transportation security, chats ab…
…
continue reading

1
015 Big Brother at the Door: Maintaining Control of Your Data
21:12
21:12
Play later
Play later
Lists
Like
Liked
21:12The data revolution has made our lives more convenient, but it’s also created vulnerabilities. Former Secretary of the U.S. Department of Homeland Security and The Chertoff Group Founder Michael Chertoff discusses his new book, “Exploding Data: Reclaiming Our Cyber Security in the Digital Age.” The use of digital tools has allowed us to generate a …
…
continue reading