Chertoff Group public
[search 0]
More
Download the App!
show episodes
 
Loading …
show series
 
The use of disinformation isn’t new, but finding the truth has become more challenging as our adversaries employ sophisticated tools to manipulate perception. The Chertoff Group’s Adam Isles speaks with national security expert J.D. Maddox about the nature of disinformation campaigns, why companies should be concerned, and what can be done to preve…
  continue reading
 
While cybersecurity is often top of mind for many companies, physical threats such as active shooters are emerging as major risks to people and businesses too. The Chertoff Group’s Jayson Ahern discusses the roles and responsibilities of leadership in guarding against these threats, how chief security officers can work with the organization, and ho…
  continue reading
 
Chertoff Group Senior Advisor Bob Pocica, who began his career at the FBI and served in various security roles at major corporations, discusses enterprise risk management. He talks about the importance of bringing physical and cybersecurity areas of a company together, and why it’s necessary for organizations to have a senior individual in charge o…
  continue reading
 
The Chertoff Group’s Brian Hess traces his career in the U.S. Air Force – from deployment to his work at the Pentagon as a Nuclear Security Policy Officer. He discusses how the lessons he learned in the military can apply to the corporate world. How can we break down the barriers that exist between physical and cyber within organizations? He stress…
  continue reading
 
Maggie Brunner of the National Governors Association discusses the steps that states are taking when it comes to cybersecurity. It’s everything from ensuring election security, dealing with ransomware threats, to protecting the electric grid. She highlights an innovative pilot program with seven states to improve cybersecurity, as well as the Natio…
  continue reading
 
The Chertoff Group’s Jayson Ahern talks about the importance of international supply chain security, and the delicate balance that must be maintained to keep goods flowing across our border. Public-private partnerships are setting standards to ensure legitimate goods come in, and the threats stay out. He discusses why companies need to understand –…
  continue reading
 
What makes a good Director of National Intelligence? In the wake of the recent retirement of National Intelligence Director Dan Coats and the resignation of principal deputy director Sue Gordon, Chertoff Group Principal Charles Allen discusses what the Office of the Director of National Intelligence means to the security of the United States. Allen…
  continue reading
 
The Senate Homeland Security and Government Affairs Committee reflected on today’s national security challenges during a recent hearing titled “18 Years Later: The state of Homeland Security After 9/11.” Chertoff Group Executive Chairman Michael Chertoff, who served as the second U.S. Homeland Security Secretary, testified about the collective work…
  continue reading
 
It’s been nearly 20 years since the terrorist attacks of September 11, 2001. The Chertoff Group’s Jayson Ahern, Charles Allen, Adam Isles, General Michael Hayden, and Lee Kair reflect on a day that changed America, and share stories about how it influenced their careers. They had a front-row seat to what happened on one of the country’s darkest day…
  continue reading
 
How can the U.S. ensure the security of its elections and protect democracy? The Chertoff Group’s Adam Isles discusses vulnerabilities in election security and strategies to guard against attacks with Philip Reitinger, president and CEO of the Global Cyber Alliance. Reitinger talks about some basic steps to cut your cyber risk and cautions that the…
  continue reading
 
Attacks on the U.S. election system and those around the world are designed to sow doubt and undermine confidence, creating challenges for democracies around the world. Adam Isles and Michael Chertoff discuss how we protect the integrity of elections – from campaigns, voters, and the voting system itself. It requires a public-private partnership, a…
  continue reading
 
Artificial Intelligence (AI) is the ability of computer systems and algorithms to simulate human responses and then learn and adapt. It holds great potential to bring innovation across a number of sectors. But it also raises a host of moral, legal and ethical questions. The Chertoff Group’s Paul Rosenzweig discusses the challenges and dilemmas this…
  continue reading
 
Software has traditionally been a black box when it comes to knowing what’s inside. Allan Friedman, director of Cybersecurity Initiatives at the National Telecommunications and Information Administration, discusses the Software Component Transparency initiative and efforts to establish a software bill of materials. It’s akin to a list of ingredient…
  continue reading
 
Artificial Intelligence (AI) is an incredibly powerful tool to help us make predictions, offering the promise of huge advances across all economic sectors and the government. But how do we define AI, what are its benefits, and how can it be applied in a way that’s consistent with our values? Carol Kuntz, a senior advisor with the Chertoff Group, di…
  continue reading
 
The electric grid is often described as a lifeline sector for the nation’s critical infrastructure. But most of this sector is privately owned. How can the government and private sector work together to protect the nation’s critical infrastructure? The Chertoff Group’s Scott Gibson and Christian Healion discuss the new Cybersecurity and Infrastruct…
  continue reading
 
Encryption is a foundational security tool. But in a time of more outbreaks of violence, the temptation is great to build a backdoor into the encryption process and foil plots before they can be carried out. Chertoff Group Co-Founder and Executive Chairman Michael Chertoff argues that we shouldn’t weaken encryption for an understandable – yet narro…
  continue reading
 
Under a new Executive Order, the security clearance process will now be conducted through the Department of Defense. It’s an important step forward in reforming the outmoded and cumbersome security clearance process. But it’s not a panacea say Chertoff Group Principal Charles Allen, Chuck Alsup, President of the Intelligence and National Security A…
  continue reading
 
Cyber threats now rank as the number one threat against U.S. government and business interests. What can the government do to protect businesses against an onslaught of attacks? The Chertoff Group’s Adam Isles and Matthew Eggers of the U.S. Chamber of Commerce discuss the Cyber SAFETY Act – proposed legislation that would modernize an early law put…
  continue reading
 
A changing business environment has meant that many companies outsource services and have multiple supply chains, introducing new risks from the outside. The Chertoff Group’s Chris Duvall talks about ways to manage third-party risk, the questions companies should be asking, and the looming threat of software subversion. He advises organizations to …
  continue reading
 
Organizations are facing increased cybersecurity threats. How should companies assess these risks and put a plan in place to prevent them? The Chertoff Group’s Adam Isles and Kurt Alaybeyoglu discuss MITRE’s ATT&CK threat assessment model that helps companies create individual plans to better understand risks, threats and ways to guard against them…
  continue reading
 
There’s no such thing as risk elimination. But if businesses focus on the most likely threats, they can minimize the damage. The Chertoff Group’s Adam Isles and Scott Gibson talk about how organizations can manage security risks effectively, the importance of monitoring those risks, and the convergence of both physical and cybersecurity threats.…
  continue reading
 
A brief note to our listeners: Our “Global Threats” podcast was originally recorded on May 3, 2019. Since that time, additional events have occurred involving the regions we discuss on the podcast. Geopolitical realities can present risks for companies. The Chertoff Group’s Jonathan Paris, an expert in Middle East, US-China and transatlantic relati…
  continue reading
 
How can technology play a role in modernizing the security clearance process? Allan Martin, co-founder and CEO of Lumina Analytics, speaks about how we move from an outmoded system that is manually based to one that is far more focused on technology. He discusses how the use of artificial intelligence could make the process more efficient and why c…
  continue reading
 
Private companies are collecting an enormous amount of data about us. What’s being collected, who is sharing it, and why? Privacy expert Justin Antonipillai, CEO of WireWheel, talks about the data that online retailers are collecting and buying about customers and how this information can be used. He discusses the steps that companies should take w…
  continue reading
 
How can we protect the nation’s critical infrastructure from both physical and cyber attacks? Brian Harrell, the first Assistant Director for Infrastructure Security within the U.S. Cybersecurity and Infrastructure Security Agency (CISA), discusses how “soft” targets – from schools to stadiums and places of worship – can be protected. He talks abou…
  continue reading
 
What is quantum computing and how might this disruptive technology change our lives? Paul Stimers, a partner at the law firm K&L Gates and founder of the Quantum Industry Coalition, talks about how the U.S. can encourage innovation in the field – or risk losing out to international competitors. He notes the importance that workforce development wil…
  continue reading
 
Sometimes, the greatest risks to a company come from the inside. The Chertoff Group’s Lee Kair and Sean Horner discuss insider risk, why it happens and what can be done to identify and mitigate those risks. They stress the importance of continually monitoring behaviors that can indicate a red flag. And they offer insights on how a robust insider th…
  continue reading
 
The impending shift to Fifth Generation Wireless - 5G – will dramatically reshape almost all aspects of our lives. Its effects will impact all industries and it’s expected to herald unprecedented innovation. Cyber security experts Sam Visner and John Nagengast, members of the Intelligence and National Security Alliance’s Cyber Council, discuss how …
  continue reading
 
Cybercriminals are escalating the cyber arms race with pace and determination. Cybersecurity expert Bill Conner, president and CEO of SonicWall, helps us explore the tactical advances by both the security industry and cybercriminals. Conner discusses the 2018 SonicWall Cyber Threat Report, which details more than 10.5 billion global malware attacks…
  continue reading
 
A common language is needed around cyber threats, says Jim Richberg, former National Intelligence Manager for Cyber and advisor to the Director of National Intelligence on cyber issues. He talks about how to turn cyber intelligence into actionable information. Lacking good metrics is the “greatest Achilles’ heel of cybersecurity,” he says. He cauti…
  continue reading
 
Our devices are increasingly connected through the Internet of Things (IoT). What are the emerging risks associated with this connectivity? Adam Isles, a principal at The Chertoff Group, shares insights about the IoT environment and the need for standards in this space. He calls for security standards to be seamlessly integrated into the software d…
  continue reading
 
What is blockchain technology and how is it applied? Alan Cohn, a blockchain and cryptocurrency expert with Steptoe, explains the ins and outs of blockchain, its strengths as a security technology, and the landscape for oversight and regulation. He discusses blockchain’s potential and how companies are using it to innovate.…
  continue reading
 
Which laws govern data in cyberspace and how do these issues evolve when conflicts happen? Chris Painter, a globally recognized leader in cybersecurity and cyber policy, discusses how governments can work together to drive good behavior online and set norms. Although we’re not yet at a stage where we have a United Nations treaty for cyberspace, Pai…
  continue reading
 
Reputational hits can cost a company and damage a business. What’s the role of business intelligence and due diligence when it comes to mitigating risk? The Chertoff Group’s Ben Joelson and Brogan Ingstad discuss the evolution of how companies have managed risk and the steps that should be taken – from mining open-source intelligence sources to nav…
  continue reading
 
A cyber-enabled economic warfare (CEEW) attack designed to undermine America’s strength would have far-reaching strategic and economic consequences. Should such an attack occur, how would the U.S. government and private sector respond and what would they ask and expect of each other in the immediate aftermath? Dr. Samantha Ravich, chairman of the F…
  continue reading
 
We often focus on cybersecurity, but physical security is just as important. How do companies take the lessons learned from organizations that have experienced tragedies and implement them to keep employees safe? The Chertoff Group’s Ben Joelson and Scott Gibson discuss technologies that could be part of the solution, and what happens when physical…
  continue reading
 
What happens in the first 24 hours after an organization experiences a crisis? Siobhan Gorman, a partner at the Brunswick Group, talks about the playbook that every organization should have in place before an incident occurs. She discusses the implications for both internal and external communications, how to involve the CEO, and the role of social…
  continue reading
 
Drones have become ubiquitous for a number of commercial and consumer purposes. But what happens when drones land in the wrong hands? The Chertoff Group’s Ben Joelson and Phil Pitsky Vice President of Federal Operations for airspace security company Dedrone discuss the challenges and threats that drones can pose and what can be done under current l…
  continue reading
 
The current security clearance process is antiquated and should be modernized. Chuck Alsup, President of the Intelligence and National Security Alliance (INSA), and Chertoff Group Principal Charles Allen, discuss the growing momentum to reform the security clearance process. They talk about how the government and private sector can work together on…
  continue reading
 
As General Michael Hayden continues his recovery at home, please enjoy his recent thoughts on private and public sector approaches to cybersecurity and information sharing as part of our latest Insights & Intelligence podcast. He chats about some of the thorniest issues facing the United States, such as Russian interference in our elections, and ho…
  continue reading
 
There are two types of companies – those that have experienced a #databreach and those that don’t know they have. As the amount of data breaches affecting the private sector has reached epidemic proportions, former FBI Executive Assistant Director Bob Anderson details the questions #CEOs should be asking to avoid an attack and what to do if a breac…
  continue reading
 
Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the purpose of the Committee on Foreign Investment in the United States (CFIUS), how it works and how we can encourage foreign investment without compromising security. He highlights some changes in the law that every company doing business in the United States should know.…
  continue reading
 
When it comes to terrorist attacks, some of the biggest threats to security involve soft targets – airports, concert venues and nightclubs. Dr. J. Bennet Waters, who leads The Chertoff Group’s global Strategic Advisory Services, discusses ways to manage risk, be aware of threats and balance security with privacy with civil liberties. Keeping ahead …
  continue reading
 
Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Corman previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, & strategy roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new…
  continue reading
 
From insertable cardiac monitors to medical devices connected to smartphones, healthcare has become more responsive to patients. Abbott’s Chris Tyberg and Chertoff Group Principal Bennet Waters discuss technological advances in digital health and the role that cybersecurity plays in this new healthcare frontier. They share insights from a new study…
  continue reading
 
What do organizations need to know to effectively manage security when moving to the cloud? Delta Risk CEO Scott Kaine walks us through important considerations such as identifying what you already have in the cloud, ensuring the environment is configured correctly, and determining who has access. He stresses the need to triage what’s important whe…
  continue reading
 
While biometric technologies have been around for a long time, we’re now starting to see them in our day-to-day lives. From iris and fingerprint scans to facial recognition software, Lee Kair, managing director at The Chertoff Group, breaks down what we need to know about biometrics. Kair, an expert in aviation and transportation security, chats ab…
  continue reading
 
The data revolution has made our lives more convenient, but it’s also created vulnerabilities. Former Secretary of the U.S. Department of Homeland Security and The Chertoff Group Founder Michael Chertoff discusses his new book, “Exploding Data: Reclaiming Our Cyber Security in the Digital Age.” The use of digital tools has allowed us to generate a …
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play