POPULARITY
In this episode, Richard Pater speaks to Jonathan Paris about the latest developments following the fall of Assad. They discuss the future of Syria and the role of Turkey and Iran plus the potential ramifications for Lebanon and Jordan. Jonathan also explores the potential strategy of the incoming Trump administration in relation to Iran. Jonathan Paris is a London-based Middle East analyst and former fellow at the Council on Foreign Relations in New York. He is currently Senior Fellow at the Center for Advanced Studies on Terrorism (CAST) and Senior Advisor Emeritus at the Chertoff Group where he shares his expertise on the region.
In this crucial episode of CISO Tradecraft, host G Mark Hardy delves into the urgent topic of the 'Salt Typhoon' threat, with insights from experts Adam Isles and Andreas Kurland from the Chertoff Group. The episode covers the implications for corporate security using SMS text messages when Chinese actors are breaking into major telecommunication entities. The conversation focuses on encryption, secure communications, and measures to mitigate risks from vulnerabilities in telecommunications infrastructure. The discussion includes practical steps for securing messaging, voice calls, virtual meetings, and emails. Learn actionable strategies to bolster your organization's cybersecurity posture and ensure robust defense against sophisticated state-level cyber threats. Thank you to our sponsor Threat Locker https://www.threatlocker.com/pages/essential-eight-fast-track?utm_source=ciso_tradecraft&utm_medium=sponsor&utm_campaign=essential-eight_q4_24&utm_content=essential-eight&utm_term=podcast Link to recommendations: https://chertoffgroup.com/end-to-end-encryption-is-essential/ Transcripts https://docs.google.com/document/d/13NKPUBU3c-qYQtX18NR08oYVRSSnHD_a Chapters: 00:00 Introduction to Salt Typhoon 01:31 Meet the Experts: Adam Isles and Andreas Kurland 02:03 Understanding the Salt Typhoon Threat 04:49 Telecommunications and Security Risks 07:37 Messaging Security: Risks and Recommendations 20:14 Voice Communication Security 28:44 Securing Virtual Meetings 34:45 Email Security: Challenges and Solutions 41:35 Conclusion and Contact Information
In this special edition of #InAIWeTrust?, EqualAI President and CEO Miriam Vogel and former Secretary of Homeland Security Michael Chertoff sit down to discuss their recent co-authored paper, Is Your Use of AI Violating the Law? An Overview of the Current Legal Landscape. Special guest Victoria Espinel, CEO of BSA | The Software Alliance, moderates the conversation with the co-authors to explore key findings, current laws on the books, and potential liabilities from AI deployment and use that lawyers, executives, judges, and policy makers need to understand in our increasingly AI-driven world. The article can be found on our website here.Read the Axios exclusive here.
In this episode, Jack Omer-Jackaman speaks to Jonathan Paris about the latest US thinking on Israel's war in Gaza and its regional implications. They discuss the US position on a potential operation in Rafah, President Biden's push for a two-state solution, and the likely impact of Middle East policy on the next US election. Paris is a London-based analyst, a former Middle East Fellow at the Council on Foreign Relations, and an advisor to the Chertoff Group in Washington.
Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships. We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House. Links to resources: Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog National Cybersecurity Strategy 2023 Learn more about your ad choices. Visit megaphone.fm/adchoices
Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships. We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House. Links to resources: Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog National Cybersecurity Strategy 2023 Learn more about your ad choices. Visit megaphone.fm/adchoices
Episode SummaryIn this episode, Special Advisor for Cyber Risk at the NACD, Christopher Hetner, returns to the show to discuss the new SEC cybersecurity rules. Chris has over 25 years of experience in cybersecurity, helping protect industries, infrastructures, and economies, serving in roles including as SVP of Information Security at Citi, Senior Cybersecurity Advisor to the Chairman of the US SEC, Executive Member of IANS, the National Board Director of the Society of Hispanic Professional Engineers, Senior Advisor for the Chertoff Group, Senior Advisor to the CEO of Stuart Levine & Associates, and Co-Chair of Nasdaq Cybersecurity and Privacy.Today, Chris talks about the developments since January 2023, the timeframe requirements in practice, and normalizing cybersecurity incidents as business-as-usual. What is Inline XBRL? Learn how startups could prepare themselves for these changes, the scope of disclosure, and how risk management strategies might evolve to address Cloud-specific threats. Timestamp Segments· [02:36] What has changed since January?· [06:49] Why things changed.· [08:51] Was it a good move?· [12:27] Determining the materiality of cybersecurity incidents “without unreasonable delay.”· [17:49] Is 4 days enough?· [22:19] The scope of disclosure.· [24:09] Normalizing cybersecurity incidents.· [26:24] Moving toward real-time monitoring.· [28:52] Is insurance becoming a forcing function?· [32:18] Evolving risk management strategies.· [36:05] Third-party disclosure requirements· [39:51] How do startups prepare?· [41:52] What is Inline XBRL?· [42:54] Inline XBRL to 8-k.· [43:30] How the tagging requirement impact the disclosure process. Notable Quotes· “The magnitude of these events is the percentage of the event relative to revenue.”· “We're going to see market forces drive these safety standards within our enterprises.” Relevant LinksLinkedIn: Christopher Hetner Resources:https://www.sec.gov/news/press-release/2023-139.Secure applications from code to cloud. Prisma Cloud, the most complete cloud-native application protection platform (CNAPP).Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
On this episode, David London and Adam Isles from the Chertoff Group stop by to discuss emerging risk topics such as AI, Supply Chain Attacks, and the new SEC regulations. Stick around and learn the tradecraft to better protect your company. Special Thanks to our Sponsors: The Chertoff Group: https://www.chertoffgroup.com.Note you can read more about their thoughts on AI here: https://www.chertoffgroup.com/managing-ai-risks/ Prelude: https://www.preludesecurity.com/ CPrime: Visit https://www.cprime.com/train to schedule an IT governance workshop to align expectations, capture priorities, and improve effective governance across your entire technology portfolio. Use the code CPRIMEPOD to get 15% off your training course purchase. Transcripts: https://docs.google.com/document/d/1tW0kOYCURXgRF-z7UqeQGga0zAkwGuZ9/ Chapters 00:00 Introduction 02:33 The SEC's Final Rule on Cybersecurity Disclosure 05:29 What is a Material Incident? 07:13 The Commission's Final Rule on Board Engagement in Cybersecurity Risk 10:03 The Four Day Rule for Incident Reporting 12:46 The Implications of the New Role of the CISO 15:46 The Ticking Clock on Disclosure 18:31 SolarWinds and the Software Chain Security Exposure 19:53 The Role of the Software Bill of Materials (SBOM) in the Software Supply Chain Security Challenges 21:29 The Rise of the SBOM 23:16 The Rise of Expectations in the U.S. Government 25:02 The Future of Software Security 27:22 The Progress of the CMMC Program 29:59 The SEC Disclosure Requirements: What to Expect From Your Board 31:57 How to Reduce Complexity in Your Software Development Lifecycle 34:05 How AI is Impacting Our Business and Cyber 37:32 How to Measure and Manage Cyber Risks Effectively 39:57 The SEC's Final Rule on Disclosure
Don't let Bobby the Intern cause havoc in your network. On this episode of CISO Tradecraft, G Mark Hardy discusses the importance of training new hires in cybersecurity to create a strong security culture within an organization. The focus is on shaping employees' behavior and beliefs to enhance the overall cybersecurity posture. Special Thanks to our Two Sponsors: 1) The Chertoff Group: www.chertoffgroup.com 2) Prelude: https://www.preludesecurity.com/ Transcripts: https://docs.google.com/document/d/1Z4ftmqZdUMkxD6ATRRLp0EmO_DVluQ4n Chapters 00:00 Introduction 03:57 How to Build a Security Culture 07:19 The Importance of a Good Username and Password 11:24 How to Use MFA to Protect Your Brand 12:50 How to Teach Your Employees About Phishing 17:07 How to Deal with External Email Addresses 20:30 How to Avoid a Business Email Compromise 22:42 How to Protect Your Website from Attackers 24:40 How to Secure Your Applications 26:46 The Importance of Threat Modeling 30:48 QR Codes and How to Use Them Effectively 32:34 Delaying Desktop Patches 34:36 How to Teach Your New Hires About Security 36:30 How to Orient Your New Employees
Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships. We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House. Links to resources: Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog National Cybersecurity Strategy 2023 US GAO Snapshot: Cybersecurity: Launching and Implementing the National Cybersecurity Strategy
Michael Chertoff is an American attorney who was the second United States Secretary of Homeland Security to serve under President George W. Bush. He was the co-author of the USA PATRIOT Act. Chertoff previously served as a United States circuit judge of the United States Court of Appeals for the Third Circuit, as a federal prosecutor, and as Assistant U.S. Attorney General. He succeeded Tom Ridge as U.S. Secretary of Homeland Security on February 15, 2005. Since leaving government service, Chertoff has worked as senior of counsel at the Washington, D.C. law firm of Covington & Burling. He also co-founded the Chertoff Group, a risk-management and security consulting company.For links to the 9/11 episodes Josh references in the interview, see below:Dave Paventi - https://rb.gy/hjoncTom Wilson - https://rb.gy/gzvywMichael O'Connor - https://rb.gy/wdrdzIvonne Sanchez - https://rb.gy/1haxtThis show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5351305/advertisement
Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships. We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House. Links to resources: Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog National Cybersecurity Strategy 2023
A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz Allen Hamilton on the DoD's zero trust journey. Analysis of the National Cybersecurity strategy from our special guests, Adam Isles, Principal at the Chertoff Group and Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology with the National Security Council. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/57 Selected reading. JCDC Cultivates Pre-Ransomware Notification Capability (Cybersecurity and Infrastructure Security Agency CISA) US cyber officials make urgent push to warn businesses about vulnerabilities to hackers (CNN) Untitled Goose Tool Aids Hunt and Incident Response in Azure, Azure Active Directory, and Microsoft 365 Environments | CISA (Cybersecurity and Infrastructure Security Agency CISA) New CISA tool detects hacking activity in Microsoft cloud services (BleepingComputer) CISA Releases Six Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA) The Microsoft Reply Attack (Avanan) More victims emerge from Fortra GoAnywhere zero-day attacks (Security | More Clop GoAnywhere attack victims emerge (SC Media) Mass-Ransomware Attack on GoAnywhere File Transfer Tool Exposes Companies Worldwide (Medium) City of Toronto confirms data theft, Clop claims responsibility (BleepingComputer) Canadian movie chain Cineplex among the victims of GoAnywhere MFT hack (Financial Post) Personal data of Rio Tinto's Aussie staff may have been hacked - memo (Reuters) Another GoAnywhere Attack Affects Japanese Giant Hitachi Energy (Heimdal Security Blog) Using Starlink Paints a Target on Ukrainian Troops (Defense One) As CISA chief notes lack of Russian cyberattacks against US, experts focus on enhancing nuclear reactor security (Utility Dive) Using Deception to Learn About Russian Threat Actors (Security Boulevard)
This week: Navarro's trial gets pushed back; Manhattan DA's office has convened a special grand jury regarding Trump's role in paying hush money to Stormy Daniels; SCOTUS investigates itself…kinda, but not really, and has paid The Chertoff Group at least $1 million dollars in consulting fees. Follow our hosts on Twitter Allison Gill https://twitter.com/allisongill Andrew Torrez https://twitter.com/patorrezlaw The Podcast: https://twitter.com/aisle45pod Want to support this podcast and get it ad-free and early? Go to: https://www.patreon.com/aisle45pod Listener Survey: http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode BICOM Director Richard Pater speaks to Jonathan Paris about the current state of US and Israeli policy concerning Iran and Russia. In a wide-ranging conversation they discuss the geopolitical implications of both Tehran's nuclear programme and Russia's invasion of Ukraine. Jonathan is a London-based analyst, a former Middle East Fellow at the Council on Foreign Relations, and a senior adviser to the Chertoff Group.
On this episode of The Global Exchange, Colin Robertson speaks to Paul Rosenzweig on the threats to U.S. democracy and the implications for Canada. Participants' Biographies: Paul Rosenzweig is an accomplished writer and speaker with a national reputation in cyber security and homeland security. He is the founder of Red Branch Consulting PLLC, a homeland security consulting company. He is also a Senior Advisor to The Chertoff Group. Mr. Rosenzweig formerly served as Deputy Assistant Secretary for Policy in the Department of Homeland Security. Host biography Colin Robertson is a former diplomat, and Senior Advisor to the Canadian Global Affairs Institute, https://www.cgai.ca/colin_robertson Read and Watch: “Oh Canada: A Canadian Risk Assessment of the United States” by Paul Rosenzweig– https://www.cgai.ca/oh_canada_a_canadian_risk_assessment_of_the_united_states A Shadow Intelligence by Oliver Harris – https://www.chapters.indigo.ca/en-ca/books/a-shadow-intelligence/9780349142968-item.html Ted Lasso – https://www.imdb.com/title/tt10986410/ Recording Date: 6 July 2022. Give 'The Global Exchange' a review on Apple Podcast! Follow the Canadian Global Affairs Institute on Facebook, Twitter (@CAGlobalAffairs), or on Linkedin. Head over to our website www.cgai.ca for more commentary. Produced by Charlotte Duval-Lantoine. Music credits to Drew Phillips.
The recently signed infrastructure law continues the United States' over-reliance on the most dangerous way to travel: driving a vehicle. Did Congress make sufficient safety improvements to decrease the dangers posed by driving in the United States? This episode will examine all vehicle-related safety provisions to help you weigh your own transportation options. Please Support Congressional Dish – Quick Links Contribute monthly or a lump sum via PayPal Support Congressional Dish via Patreon (donations per episode) Send Zelle payments to: Donation@congressionaldish.com Send Venmo payments to: @Jennifer-Briney Send Cash App payments to: $CongressionalDish or Donation@congressionaldish.com Use your bank's online bill pay function to mail contributions to: 5753 Hwy 85 North, Number 4576, Crestview, FL 32536. Please make checks payable to Congressional Dish Thank you for supporting truly independent media! View the Show Notes on our Website at https://congressionaldish.com/cd251-bif-driving-dangers-sustained/ Background Sources Recommended Congressional Dish Episodes CD246: BIF: Appalachian Chemical Storage CD247: BIF: The Growth of US Railroads CD240: BIF: The Infrastructure BILL CD021: Trailblazer vs. ThinThread Why You Should Be Afraid of Cars “Number of worldwide air traffic fatalities from 2006 to 2021.” Apr 12, 2022. Statista. National Highway Traffic Safety Administration. Mar 2022. “Overview of Motor Vehicle Crashes in 2020.” U.S. Department of Transportation. “Number of deaths / injuries directly linked to boating accidents in the U.S. from 2002 to 2020.” Jun 2021. Statista. Injury Facts. “Railroad Deaths and Injuries.” National Safety Council. Jon Ziomek. Sept 28, 2020. “Disaster on Tenerife: History's Worst Airline Accident.” Historynet. National Highway Traffic Safety Administration. “Distracted Driving.” U.S. Department of Transportation. Problems the Law Does (and Does Not) Address Jake Blumgart. Nov 15, 2021. “The Infrastructure Bill May Not Be So Historic After All.” Governing. Self Driving Cars Neal E. Boudette. May 3, 2022. “Paying customers could hail driverless taxis in San Francisco later this year.” San Francisco Examiner. Natasha Yee. Apr 1, 2022. “Waymo Bringing Driverless Vehicles to Downtown Phoenix ... Soon.” Phoenix New Times. “24 Self-Driving Car Statistics & Facts.” Feb 20, 2022. Carsurance. Neal E. Boudette. Jul 5, 2021. “Tesla Says Autopilot Makes Its Cars Safer. Crash Victims Say It Kills.” The New York Times. Clifford Law Offices PC. May 5, 2021. “The Dangers of Driverless Cars.” The National Law Review. Katie Shepherd and Faiz Siddiqui. Apr. 19, 2021. “A driverless Tesla crashed and burned for four hours, police said, killing two passengers in Texas.” The Washington Post. Riley Beggin. Jan 15, 2021. “Self-Driving Vehicles Allowed to Skip Some Crash Safety Rules.” Government Technology. Faiz Siddiqui. Oct 22, 2020. “Tesla is putting ‘self-driving' in the hands of drivers amid criticism the tech is not ready.” The Washington Post. Niraj Chokshi. Feb 25, 2020. “Tesla Autopilot System Found Probably at Fault in 2018 Crash.” The New York Times. Michael Laris. Feb 11, 2020. “Tesla running on ‘Autopilot' repeatedly veered toward the spot where Apple engineer later crashed and died, federal investigators say.” The Washington Post. Alex Davies. May 16, 2019. “Tesla's Latest Autopilot Death Looks Just Like a Prior Crash.” Wired. Neal E. Boudette and Bill Vlasic. Sept 12, 2017. “Tesla Self-Driving System Faulted by Safety Agency in Crash.” The New York Times. Rachel Abrams and Annalyn Kurtz. Jul 1, 2016. “Joshua Brown, Who Died in Self-Driving Accident, Tested Limits of His Tesla.” The New York Times. Alcohol Detection Systems Isaac Serna-Diez. Nov 23, 2021. “Alcohol Detection Systems Will Now Be Mandatory In All New Cars To Prevent Drunk Driving. YourTango. Keyless Entry Carbon Monoxide Deaths “Toyota Introduces Automatic Engine Shut Off to Prevent Carbon Monoxide Deaths.” Jun 20, 2019. Kelley Uustal Trial Attorneys. “Toyota Has the Most Keyless Ignition Related Deaths, But Takes no Action.” Jun 7, 2019. KidsAndCars.org. Kids Left in Cars Morgan Hines. Aug 2, 2019. “There's science behind why parents leave kids in hot cars.” USA Today. Scottie Andrew and AJ Willingham. July 30, 2019. “More than 38 kids die in hot cars every year, and July is the deadliest month.” CNN. John Bacon. Jul 28, 2019. “'He will never forgive himself': Wife defends husband in devastating hot car deaths of twins.” USA Today. Eric Stafford. May 6, 2019. [“Children Can Die When Left in the Back Seat on a Warm Day—and 800 Already Have. “Children Can Die When Left in the Back Seat on a Warm Day—and 800 Already Have.” Car and Driver. National Highway Traffic Safety Administration. “Child Heatstroke Prevention: Prevent Hot Car Deaths.” U.S. Department of Transportation. Motorcycle Helmets “Motorcycle helmet use laws by state.” May 2022. Insurance Institute for Highway Safety. “Facts + Statistics: Motorcycle crashes.” Insurance Information Institute. Adam E. M. Eltorai et. al. March 16, 2016. “Federally mandating motorcycle helmets in the United States.” BMC Public Health. Truck Safety “How Many Miles Do Semi Trucks Last?” Rechtien. Non-motorist Safety “Pedestrian Traffic Fatalities by State: 2020 Preliminary Data.” Governors Highway Safety Association. “Pedestrian Traffic Fatalities by State: 2020 Preliminary Data.” [Full Report] March 2021. Governors Highway Safety Association. John Wenzel. Jan 6, 2020. “Bollard Installation Cost.” Saint Paul Sign & Bollard. Richard Peace. Feb 20, 2019. “Why You Don't Want a Superfast Electric Bicycle.” Electric Bike Report. 911 System Upgrades Mark L. Goldstein. January 2018. “Next Generation 911: National 911 Program Could Strengthen Efforts to Assist States” [GAO-18-252]. Government Accountability Office. National 911 Program. December 2016. “2016 National 911 Progress Report.” U.S. Department of Transportation. CD021: Trailblazer vs. ThinThread Followup “Michael Hayden, Principal, Strategic Advisory Services.” The Chertoff Group. “Board of Directors.” Atlantic Council. Tim Shorrock. Apr 15 2013. “Obama's Crackdown on Whistleblowers.” The Nation. The Law H.R.3684 - Infrastructure Investment and Jobs Act Senate Version Law Outline DIVISION A: SURFACE TRANSPORTATION TITLE I - FEDERAL-AID HIGHWAYS Subtitle A - Authorizations and Programs Sec. 11101: Authorization of Appropriations Authorizes appropriations for Federal-Aid for highways at between $52 billion and $56 billion per year through fiscal year 2026 (over $273 billion total). Authorizes $300 million for "charging and fueling infrastructure grants" for 2022, which increases by $100 million per year (maxing out at $700 million in 2026) Authorizes between $25 million and $30 million per year for "community resilience and evacuation route grants" on top of equal amounts for "at risk coastal infrastructure grants" Authorizes a total of $6.53 billion (from two funds) for the bridge investment program Sec. 11102: Obligation Ceiling Caps the annual total funding from all laws (with many exceptions) that can be spent on Federal highway programs. Total through 2026: $300.3 billion Sec. 11111: Highway Safety Improvement Program Adds protected bike lanes to the list of projects allowed to be funded by the highway safety improvement project Adds "vulnerable road users" (non-motorists) to the list of people who must be protected by highway safety improvement projects If 15% or more of a state's annual crash fatalities are made up of non-motorists, that state will be required to spend at least 15% of its highway safety improvement project money on projects designed to improve safety for non-motorists. Each state, by the end of 2023, will have to complete a vulnerable road user safety assessment that includes specific information about each non-motorist fatality and serious injury in the last five years, identifies high-risk locations, and identifies possible projects and strategies for improving safety for non-motorists in those locations. Sec. 11119: Safe Routes to School Creates a new program to improve the ability of children to walk and ride their bikes to school by funding projects including sidewalk improvements, speed reduction improvements, crosswalk improvements, bike parking, and traffic diversions away from schools. Up to 30% of the money can be used for public awareness campaigns, media relations, education, and staffing. No additional funding is provided. It will be funded with existing funds for "administrative expenses". Each state will get a minimum of $1 million. Non-profit organizations are eligible, along with local governments, to receive and spend the funding. Non-profits are the only entities eligible to receive money for educational programs about safe routes to school. Sec. 11130: Public Transportation Allows the Transportation Secretary to allocate funds for dedicated bus lanes Sec. 11133: Bicycle Transportation and Pedestrian Walkways Adds "shared micromobility" projects (like bike shares) to the list of projects that can be funded as a highway project Electric bike-share bikes must stop assisting the rider at a maximum of 28 mph to be classified as an "electric bicycle" Subtitle B - Planning and Performance Sec. 11206: Increasing Safe and Accessible Transportation Options. Requires each state, in return for funding, to carry out 1 or more project to increase accessible for multiple travel modes. The projects can be... The enactment of "complete streets standards" (which ensure the safe and adequate accommodation of all users of the transportation system) Connections of bikeways, pedestrian walkways, and public transportation to community centers and neighborhoods Increasing public transportation ridership Improving safety of bike riders and pedestrians Intercity passenger rail There's a way for State's to get this requirement waived if they already have Complete Streets standards in place Subtitle D - Climate Change Sec. 11404: Congestion Relief Program Creates a grant program, funded at a minimum of $10 million per grant, for projects aimed at reducing highway congestion. Eligible projects include congestion management systems, fees for entering cities, deployment of toll lanes, parking fees, and congestion pricing, operating commuter buses and vans, and carpool encouragement programs. Buses, transit, and paratransit vehicles "shall" be allowed to use toll lanes "at a discount rate or without charge" Subtitle E - Miscellaneous Sec. 11502: Stopping Threats on Pedestrians By the end of 2022, the Secretary of Transportation needs to create a competitive grant pilot program to fund "bollard installation projects", which are projects that raise concrete or metal posts on a sidewalk next to a road that are designed to slow or stop a motor vehicle. The grants will pay for 100% of the project costs Appropriates only $5 million per year through 2026 Sec. 11504: Study of Impacts on Roads from Self-driving Vehicles By early 2023, the Transportation Department has to conduct a study on the existing and future effects of self-driving cars on infrastructure, mobility, the environment, and safety. Sec. 11529: Active Transportation Infrastructure Investment Program Creates a grant program authorized for $1 billion total that will fund walking and biking infrastructure projects that each cost $15 million or more and connect communities to each other, including communities in different states, and to connect to public transportation. The Federal government will pay for 80% of the project costs, except in communities with a poverty rate over 40% (the Federal government will pay 100% of the project costs in impoverished communities). TITLE III - MOTOR CARRIER SAFETY Sec. 23010: Automatic Emergency Braking: Automatic Emergency Braking A Federal regulation will be created by November 2023 which will require new commercial vehicles to be equipped with automatic braking systems and there will be performance standards for those braking systems. Sec. 23022: Apprenticeship Pilot Program Creates a three year pilot program, capped at 3,000 participants at a time, for people under 21 to be trained by people over the age of 26 to become commercial truck drivers. Drivers under the age of 21 are not allowed to transport any passengers or hazardous cargo Sec. 23023: Limousine Compliance With Federal Safety Standards A Federal regulation will be created by November 2023 requiring that limousines have a seat belts at every seating position, including side facing seats. TITLE IV - HIGHWAY AND MOTOR VEHICLE SAFETY Subtitle A - Highway Traffic Safety Sec. 24102: Highway Safety Programs Prohibit the Federal Government from withholding highway safety money to the states that refuse to require helmets for motorcycle drivers or passengers who are over the age of 18. Sec. 24103: Highway Safety Research and Development Creates a grant program (by November 2023) that will fund states that want to create a process for notifying vehicle owners about any open recalls on their cars when they register their cars with the DMV. The state receiving the money is only required to provide the notifications for two years and participation in general is voluntary. Creates financial incentives for states to create laws that prohibit drivers from holding "a personal wireless communications device" while driving, has fines for breaking that law, and has no exemptions for texting when stopped in traffic. There are exceptions for using a cell phone for navigation in a "hands-free manner" Creates financial incentives for states to create laws that require curriculum in driver's education courses to include information about law enforcement procedures during traffic stops and the rights and responsibilities of the drivers when being stopped. The states would also have to have training programs for the officers for implementing the procedures that would be explained to drivers. Sec. 24113: Implementation of GAO Recommendations Requires the Secretary of Transportation to implement all of the national-level recommendations outlined in a 2018 GAO report by the end of November 2022. Subtitle B - Vehicle Safety Sec. 24201: Authorization of Appropriations Authorizes a little over $1 billion total for vehicle safety programs from 2022 through 2026 Sec. 24205: Automatic Shutoff By November 2023, the Transportation Department will have to issue a regulation requiring fossil fuel powered vehicles with keyless ignitions to have an automatic shutoff system to prevent carbon monoxide poisoning. The amount of time that must trigger the shut off will be determined by the regulators. If the regulation is issued on time, this would go into effect most likely on September 1, 2024. Sec. 24208: Crash Avoidance Technology The Secretary of Transportation must issue a regulation establishing minimum standards for crash avoidance technology that must be included in all vehicles sold in the United States starting on a date that will be chosen by the Secretary of Transportation. The technology must alert the driver of an imminent crash and apply the breaks automatically if the driver doesn't do so. The technology must include a land departure system that warns the driver that they are not in their lane and correct the course of travel if the driver doesn't do so. Sec. 24215: Emergency Medical Services and 9-1-1 Repeals the part of the law that required the Transportation Department to publish criteria that established timelines and performance requirements for anyone who got a grant to implement the Next Generation 9-1-1 project. Sec. 24220: Advanced Impaired Driving Technology By November 2024, the Secretary of Transportation will have to finish a regulation that requires passenger motor vehicles to be standard equipped with "advanced and impaired driving prevention technology" The technology must be able to monitor the performance of a driver and/or their blood alcohol level and be able to prevent or limit the car's operation if impairment is detected or if the blood alcohol is above the legal limit. This will apply to new cars sold after November 2030 at the latest. Sec. 24222: Child Safety By November 2023, the Secretary of Transportation must finish a regulation requiring all new passenger vehicles to have a system alerting the driver visually and audibly to check the back seat when the car is turned off. Says it will be activated "when the vehicle motor is deactivated by the operator" Hearings The Road Ahead for Automated Vehicles House Committee on Transportation and Infrastructure, Subcommittee on Highways and Transit February 2, 2022 Overview: The purpose of this hearing is for Members of the Subcommittee to explore the impact of automated vehicle deployment, including automated trucks and buses, on mobility, infrastructure, safety, workforce, and other economic and societal implications or benefits. Cover Art Design by Only Child Imaginations Music Presented in This Episode Intro & Exit: Tired of Being Lied To by David Ippolito (found on Music Alley by mevio)
For at least two decades, the U.S. intelligence community and special projects agencies have been exploring the potential of prediction markets and crowd-forecasting platforms to better forecast geopolitical and technical trends. Similarly, a number of prominent corporations, including Google, Ford, Yahoo, Hewlett-Packard, and Eli Lilly, have likewise turned to these tools to predict everything from which product lines will be most profitable to whether a deadline is likely to be met. Yet despite this seeming opportunity, there remains a significant gap: almost nobody has deployed the tools for crowd-forecasting to cybersecurity problems. We propose to change that paradigm. We believe that a cybersecurity-focused forecasting market can create useful value-added information for decision-makers. To test this hypothesis we have begun a small beta test applying the principles of crowd-forecasting directly to a set of cybersecurity questions.This talk will provide background on the use of crowd-forecasting for policy and discuss some interim results of the ongoing beta test. About the speaker: Paul Rosenzweig is the founder of Red Branch Consulting PLLC, a homeland security consulting company. He is also a Senior Advisor to The Chertoff Group. Mr. Rosenzweig formerly served as Deputy Assistant Secretary for Policy in the Department of Homeland Security. He is a Professorial Lecturer in Law at George Washington University, and a Senior Fellow in the Tech, Law &Security Program at the American University, Washington College of Law. He serves as an advisor to and former member of the American Bar Association Standing Committee on Law and National Security,and a Contributing Editor of the Lawfare blog. He is a member of the ABA Cybersecurity Legal Task Force and of the United States Court of Appeals for the District of Columbia Circuit Advisory Committee on Admissions and Grievances. He serves, as well, as a Hearing Committee Member of the District of Columbia Board of Professional Responsibility. In 2011 he was a Carnegie Fellow in National Security Journalism at the Medill School of Journalism, Northwestern University.Mr. Rosenzweig is a cum laude graduate of the University of Chicago Law School. He has an M.S. in Chemical Oceanography from the Scripps Institution of Oceanography, University of California at San Diego and a B.A from Haverford College. Following graduation from law school he served as a law clerk to the Honorable R. Lanier Anderson, III of the United States Court of Appeals for the Eleventh Circuit. He is the author of Cyber Warfare: How Conflicts in Cyberspace are Challenging America and Changing the World and of three video lecture series from The Great Courses, Thinking About Cybersecurity: From Cyber Crime to Cyber Warfare; The Surveillance State: Big Data, Freedom,and You; and Investigating American Presidents. He is the co-author (with James Jay Carafano) of Winning the Long War: Lessons from the Cold War for Defeating Terrorism and Preserving Freedom and co-editor (with Jill D. Rhodes and Robert S. Litt) of the Cybersecurity Handbook (3rd ed.). He is also co-editor (with Timothy McNulty and Ellen Shearer) of two books, Whistleblowers, Leaks and the Media: The First Amendment and National Security, and National Security Law in the News: A Guide for Journalists, Scholars,and Policymakers. Mr. Rosenzweig is a member of the Literary Society of Washington.
Podcast: Control System Cyber Security Association International: (CS)²AIEpisode: 29: How to Be a Good CISO Even in the Face of Challenges with Mark WeatherfordPub date: 2022-03-08Derek Harp is happy to have Mark Weatherford, the CSO at AlertEnterprise, and the Chief Strategy Officer at the National Cybersecurity Center, joining him today for another episode in the series of security leader interviews!Mark grew up on a farm in an agricultural community in Northern California and left the farming life to embark on a career in the Navy and travel the world as a technologist, helping companies in cyberspace. Throughout his career, he always planned to get back into ranching. Apart from being a well-known security leader, Mark is a military veteran, technologist, beekeeper, hunter, pilot, and a soon-to-be rancher and gardener. He is also a husband and father.Mark has had various executive-level cybersecurity roles, including Global Information Security Strategist at Booking Holdings, Chief Cybersecurity Strategist at vArmour, a Principal at The Chertoff Group, Chief Security Officer at the North American Electric Reliability Corporation, and Chief Information Security Officer for the state of Colorado. He was appointed in 2008 by Governor Arnold Schwarzenegger to serve as California's first Chief Information Security Officer. In 2011, he got appointed by the Obama Administration as the Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. Mark is a well-rounded individual who does a variety of interesting things. In this episode of the (CS)²AI Podcast, he shares his backstory and describes his career journey. He talks about the challenge CISOs face today, explains why relationships are vital, and discusses what it takes to be a good CISO today. He also offers some valuable nuggets of career advice for listeners.You will not want to miss this episode if you are in a first-time CISO role or considering making a career in cybersecurity. Stay tuned for more!Show highlights:Growing up, Mark was always playing around with electricity, wiring up motors and lights, and often overloading circuits and blowing breakers. (3:20)Mark became a cryptologic technician in the Navy and focused on signals intelligence. (4:50)In 1994, Mark wrote his grad school thesis on information security. That changed his life and set the stage for his future. (7:59)Mark created the Navy's first operational red team. (10:14)Mark explains why a CISO cannot be an expert today. (12:20)Mark got hired as the first CISO for the state of Colorado. It was a great learning experience! (15:06)Why is becoming a CISO is all about developing relationships? (19:47)Mentoring others is one of the most satisfying things Mark has ever done. (25:28)Mark had a lot of influence in his role at DHS. (32:01)Some advice for people thinking of taking on CISO roles. (35:34)What do you need to focus on and learn if you are aiming for a senior CISO position? (38:24)What do people in advisory board roles do? (46:08)Links:(CS)²AIMark Weatherford on LinkedInAlertEnterpriseNational Cybersecurity CenterThe podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Derek Harp is happy to have Mark Weatherford, the CSO at AlertEnterprise, and the Chief Strategy Officer at the National Cybersecurity Center, joining him today for another episode in the series of security leader interviews! Mark grew up on a farm in an agricultural community in Northern California and left the farming life to embark on a career in the Navy and travel the world as a technologist, helping companies in cyberspace. Throughout his career, he always planned to get back into ranching. Apart from being a well-known security leader, Mark is a military veteran, technologist, beekeeper, hunter, pilot, and a soon-to-be rancher and gardener. He is also a husband and father. Mark has had various executive-level cybersecurity roles, including Global Information Security Strategist at Booking Holdings, Chief Cybersecurity Strategist at vArmour, a Principal at The Chertoff Group, Chief Security Officer at the North American Electric Reliability Corporation, and Chief Information Security Officer for the state of Colorado. He was appointed in 2008 by Governor Arnold Schwarzenegger to serve as California's first Chief Information Security Officer. In 2011, he got appointed by the Obama Administration as the Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. Mark is a well-rounded individual who does a variety of interesting things. In this episode of the (CS)²AI Podcast, he shares his backstory and describes his career journey. He talks about the challenge CISOs face today, explains why relationships are vital, and discusses what it takes to be a good CISO today. He also offers some valuable nuggets of career advice for listeners. You will not want to miss this episode if you are in a first-time CISO role or considering making a career in cybersecurity. Stay tuned for more! Show highlights: Growing up, Mark was always playing around with electricity, wiring up motors and lights, and often overloading circuits and blowing breakers. (3:20) Mark became a cryptologic technician in the Navy and focused on signals intelligence. (4:50) In 1994, Mark wrote his grad school thesis on information security. That changed his life and set the stage for his future. (7:59) Mark created the Navy's first operational red team. (10:14) Mark explains why a CISO cannot be an expert today. (12:20) Mark got hired as the first CISO for the state of Colorado. It was a great learning experience! (15:06) Why is becoming a CISO is all about developing relationships? (19:47) Mentoring others is one of the most satisfying things Mark has ever done. (25:28) Mark had a lot of influence in his role at DHS. (32:01) Some advice for people thinking of taking on CISO roles. (35:34) What do you need to focus on and learn if you are aiming for a senior CISO position? (38:24) What do people in advisory board roles do? (46:08) Links: https://www.cs2ai.org/ ((CS)²AI) https://www.linkedin.com/in/maweatherford/ (Mark Weatherford on LinkedIn) https://alertenterprise.com/ (AlertEnterprise) https://cyber-center.org/ (National Cybersecurity Center) Mentioned in this episode: Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership)
In today's episode of the RANE Insights podcast, RANE founder David Lawrence zeroes in on cybersecurity and disinformation. His guest is the former Secretary of U.S. Homeland Security, now Chairman of the Chertoff Group, Michael Chertoff. They discuss how the crisis over Ukraine may accelerate disinformation, destabilization, and digital warfare. Stay ahead of cyber risks that could impact your operations. Become a RANE member today! Visit ranenetwork.com
Social media giants, such as Facebook, Instagram, YouTube, TikTok and others have been at the center of many controversies lately. These include the recent social media outages which shocked the world on October 5th, 2021, raising many questions about how and why they happened, and their broad implications, as well as the recent congressional hearings around the dangers posed by many of these social media platforms, especially for children and teens. Dr. Sahar Khamis discussed this important topic with her guests Mr. Mike Sexton and Ms. Eliza Campbell Mr. Mike Sexton is a DC-based cyber policy and Middle East expert. Mike previously served as Fellow and Cyber Program Director at the Middle East Institute (MEI); Senior Fellow and Associate Director of the Qatar-America Institute; Senior Analyst at the Chertoff Group; and Data Manager at the Chicago Project on Security and Threats. Mike has published articles and reports on cyber attacks, cryptography, and their implications for national security, human security, and international norms. He also serves as Managing Editor for Charged Affairs, the official journal of Young Professionals in Foreign Policy. Ms. Eliza Campbell is the Director of the Middle East Institute (MEI) Cyber Program. She was previously a researcher in technology and human rights at the Center for Contemporary Arab Studies at Georgetown University, and she was a 2017-2018 Fulbright researcher in Bulgaria. She has worked in the humanitarian field in Jordan. She holds a bachelor's degree in political science and Arabic and a Masters degree in Arab Studies from Georgetown University. She co-edited with Mike Sexton the MEI-published book, Cyber War & Cyber Peace in the Middle East (October 2020). The episode was broadcast: 29/10/2021 US Arab Radio can be heard on wnzk 690 AM, WDMV 700 AM, and WPAT 930 AM. Please visit: www.facebook.com/USArabRadio/ Web site : arabradio.us/ Online Radio: www.radio.net/s/usarabradio Twitter : twitter.com/USArabRadio Instagram : www.instagram.com/usarabradio/ Youtube : US Arab Radio Show less
The latest on homeland security priorities Michael Chertoff, co-founder and executive chairman of The Chertoff Group, former DHS secretary, touches on each of the major threats facing the Department of Homeland Security and provides recommendations for the current secretary Addressing health disparities at new HHS climate office Rachel Levine, assistant secretary for health at the Department of Health and Human Services, explains disparities in the negative health effects of climate change and her office's plans to address them
Dr. Mario Ramirez, Managing Director at Opportunity Labs, discusses news from the CDC that the delta variant is spreading rapidly in the U.S. Allison Schrager, Senior Fellow at the Manhattan Institute, shares her Bloomberg Opinion piece Millennial Wealth is Real — and Misunderstood. Bloomberg Businessweek Editor Joel Weber and Businessweek Markets and Finance Editor Pat Regnier talk about the Businessweek Magazine cover story Reddit Hates Short Sellers, But the Stock Market Needs Them. Michael Chertoff, Chairman and Co-Founder of the Chertoff Group and former Secretary of Homeland Security, discusses how companies and governments can protect themselves from cyber-attacks. And we Drive to the Close with Eleanor Reid, Partner and Head of Corporate Strategy at Gideon Strategic Partners. Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Dr. Mario Ramirez, Managing Director at Opportunity Labs, discusses news from the CDC that the delta variant is spreading rapidly in the U.S. Allison Schrager, Senior Fellow at the Manhattan Institute, shares her Bloomberg Opinion piece Millennial Wealth is Real — and Misunderstood. Bloomberg Businessweek Editor Joel Weber and Businessweek Markets and Finance Editor Pat Regnier talk about the Businessweek Magazine cover story Reddit Hates Short Sellers, But the Stock Market Needs Them. Michael Chertoff, Chairman and Co-Founder of the Chertoff Group and former Secretary of Homeland Security, discusses how companies and governments can protect themselves from cyber-attacks. And we Drive to the Close with Eleanor Reid, Partner and Head of Corporate Strategy at Gideon Strategic Partners. Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Michael Chertoff, former Secretary of Homeland Security and Co-founder and Executive Chairman of the Chertoff Group, discusses the U.S.-Mexico border and what it will take to address immigration reform that also tackles border security.RelatedRead a transcript of this conversationLearn more about the Bush Institute's work on immigration
As hospitals and health systems are increasingly targeted by cybercriminals, what can be done to ensure robust cybersecurity? How can healthcare providers stay one step ahead of increasingly sophisticated digital threats? In this podcast, WittKieffer's Nick Giannas and Zach Durst interview two leading cybersecurity experts: Anahi Santiago, Chief Information Security Officer for ChristianaCare, and Adam Isles, Principal of the Chertoff Group. Santiago and Isles address key issues that healthcare organizations are facing, and provide clear, tangible solutions for addressing today's, and tomorrow's, most dangerous threats.
Darin is joined by cybersecurity pioneer and expert Mark Weatherford. Mark has been invocled in cybercybersecurity for over 2 decades and serverd in government and the private sector. Mark served as the Chief Information Security Officer (CISO) for the states of Colorado and California. He also was Deputy Under Secretary for Cybersecurity, US Dept of Homeland Security. Mark worked as Principal at the Chertoff Group, Booking Holdings and vArmour and served as an Advisory and/or Board of Directors for Coalfire, Blue Lava, Interos, Tenable and many others.
We discuss with Michael Chertoff a variety of subjects from UK-USA relationship, Donald Trump, COVID-19, Joe Biden, the future of politics, cyber-security, China and much more. Michael Chertoff, an American attorney who was the United States Secretary of Homeland Security serving under President George W. Bush. As Secretary, he led a 218,000 person department with a budget of $50 billion. Mr. Chertoff developed and implemented border security and immigration policy; promulgated homeland security regulations; and spearheaded a national cyber security strategy. In 2009, he co-founded the Chertoff Group, a risk-management and security consulting company.
Former Homeland Security Secretary Michael Chertoff, Co-Founder and Executive Chairman of The Chertoff Group, discusses the Count Every Vote campaign. Hosts: Carol Massar, June Grasso, and Kevin Cirilli. Producer: Doni Holloway. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Former Homeland Security Secretary Michael Chertoff, Co-Founder and Executive Chairman of The Chertoff Group, discusses the Count Every Vote campaign. Hosts: Carol Massar, June Grasso, and Kevin Cirilli. Producer: Doni Holloway.
In this episode, BICOM’s research associate Samuel Nurding speaks with Jonathan Paris, a geopolitical analyst and Senior Advisor at the Washington-based Chertoff Group, to discuss the US presidential election, how the make-up of the Senate and House of Representatives could impact US foreign policy, and what a Biden 1st term means for Israel, Iran and the region as opposed to a Trump 2nd term.
We asked over 200 family office executives to give us their thoughts on risk and threat matters they face every day. The results were illuminating and answered many questions and provided some unexpected insights. Listen to our discussion with industry expert Chad Sweet, former Chief of Staff of the U.S. Department of Homeland Security and Co-Founder and CEO of The Chertoff Group. We review these findings, discuss U.S. election security, and discuss the relevant global geopolitical events affecting family offices.
Congresswoman- turned-Director of the Wilson Center, Jane Harman, joins former Secretary of Homeland Security Michael Chertoff as we discuss national security threats and concerns facing the world. Terrorists don't care if you're a Democrat or a Republican. Representing the aerospace center of California during nine terms in Congress, Jane Harman served on all the major security committees: six years on Armed Services, eight years on Intelligence, and eight on Homeland Security. During her long public career, Harman has been recognized as a national expert at the nexus of security and public policy issues, and has received numerous awards for distinguished service. Jane Harman resigned from Congress in February 2011 to join the Woodrow Wilson Center as its first female Director, President and CEO. She is a member of the Defense Policy Board, the State Department Foreign Policy Board, and the Homeland Security Advisory Committee. She also serves on the Executive Committee of the Trilateral Commission and the Advisory Board of the Munich Security Conference. As Secretary of the U.S. Department of Homeland Security from 2005 to 2009, Michael Chertoff led the country in blocking would-be terrorists from crossing our borders or implementing their plans if they were already in the country. He was the co-author of the Patriot Act. Before heading up the Department of Homeland Security, Chertoff served as a federal judge on the U.S. Court of Appeals for the Third Circuit. Earlier, during more than a decade as a federal prosecutor, he investigated and prosecuted cases of political corruption, organized crime, corporate fraud and terrorism – including the investigation of the 9/11 terrorist attacks. After leaving DHS, Chertoff created the Chertoff Group and provides high-level strategic counsel to corporate and government leaders on a broad range of security issues, from risk identification and prevention to preparedness, response and recovery. “Risk management has become the CEO's concern,” he says. “We help our clients develop comprehensive strategies to manage risk without building barriers that get in the way of carrying on their business.” To RSVP for upcoming events, visit our events page at: https://www.thecommongoodus.org --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
In this episode, Andrew and Scott speak with Michael Chertoff, Secretary of Homeland Security from 2005 to 2009. Secretary Chertoff is now senior counsel at Covington & Burling LLP and Chairman of the Chertoff Group, a cybersecurity consultancy. He shares his views on the post-Covid world, including how changed patterns of work may place new demands on infrastructure and cybersecurity. We also discuss disaster preparedness, election security, and countering disinformation. Reading Notes: When do we dial back the coronavirus red alert? Michael Chertoff writes that the costs of an extended lock down are real and substantial, and fall disproportionately on less privileged members of our society. Will your 2020 vote actually get counted? Michael Chertoff argues that election security is a national challenge, and not one that a single spending bill can fix.
How secure is the Homeland? In this episode, special guest expert Paul Rosenzweig, founder of the Homeland Security consulting company, Red Branch Consulting, and senior advisor to the Chertoff Group joins Politics: Meet Me in the Middle. He was the first deputy assistant secretary for policy in the Department of Homeland Security and he's an author, a consistent contributor to the Atlantic, and a frequent authority on CNN. Paul joins the panel of: host Bill Curtis, and co-hosts Pulitzer Prize winning historian Ed Larson and International Trade Attorney Jane Albrecht to discuss questions of the use of force of the use of Homeland Security "troops" to quell local protests, especially regarding the protests in Portland, Oregon. Did the federal response go too far and is the executive expression of force written too broadly? Professor Ed Larson provides historical context of Federal militia entering and occupying a state and the entire panel discusses cybersecurity and the vulnerability of U.S. elections. Paul and Jane also discuss the role of the Department of Homeland Security including why and how it was formulated after 9/11, how it has changed in the last 20 years, and the role it is currently playing in today's administration - with a targeted focus on immigration monitoring. The conversation moves towards Paul's time at Homeland Security, especially his focus on rules for International Data Protection, what it means, and how it helps track terrorists' movements around the globe, and continues into how this data share personally affects Americans in their day-to-day lives. Paul shares his thoughts and experiences on the current state of checks-and-balances and the panel weighs in with their perspectives. They also delve into the issue of the safety and security of the upcoming election and the role of DHS in protecting the election, including issues with electronic voting versus mail in voting and the problems each option poses. TIMESTAMPS: (1:35) - History of using Federal troops in local disputes. (4:00) Federal "Troops" versus Law Enforcement. Border Tactical Unit. (7:30) Can the Federal Government deploy troops against the wishes of a State Governor? (13:50) How and why was the Department of Homeland Security DHS created. (19:00) Cybersecurity and Data. (23:00) China and data theft. (27:30) Checks and Balances versus Executive Power. (35:20) Election security and DHS. (39:00) Mail-in balloting. ------------------------------------- Follow Us on Twitter: @politicsMMITM Hosted by: Bill Curtis, Ed Larson and Jane Albrecht Guest: Paul Rosenzweig - Follow Paul on Twitter @rosenzweigp Producer: Mike Thomas Edited by: Aj Moseley Sound Engineering by: Michael Kennedy Theme Music by: Celleste & Eric Dick
This week, Analog Devices CEO Vincent Roche joined to discuss his $21 billion dollar chip deal to acquire rival Maxim and where he is seeking to gain scale with the combined company. George Pyne, founder and CEO of Bruin Sports Capital, came on to talk about Dan Snyder's decision to retire the Redskins name from the Washington NFL team after years of refusing to entertain the idea and what it could mean for the team's hopes for a new stadium. Michael Chertoff, former U.S. Secretary of Homeland Security under President George W. Bush and current executive chairman of The Chertoff Group, went through this week's high profile hacks with Twitter's worst security breach ever and the news that Russian intelligence is working to steal crucial COVID-19 vaccine research. Then Emily Oster, Brown University economics author and best-selling author of parenting books, "Expecting Better" and "Crib Sheet" talked about the data around children, coronavirus and school reopenings and why the U.S. economy depends on what happens to kids this fall.
Listen to our discussion with the founders of The Chertoff Group, Former United States Secretary of Homeland Security Michael Chertoff and Chad Sweet, Former Chief of Staff of the Department of Homeland Security.
When a global crisis with the magnitude of the Coronavirus Pandemic takes place, it inevitably has both positive and negative consequences on various aspects of life, such as education, journalism, heath, and science. Dr. Sahar Khamis discussed this important topic with her guests Mike Sexton and Mohammed Soliman from the Cyber Program at the Middle East Institute . Mike Sexton is a Fellow and Director of the Cyber Program at the Middle East Institute. His work focuses on the intersection of cyber technology, international security, and governance in the Middle East. Mike previously served as Senior Fellow and Associate Director of the Qatar-America Institute, as Senior Analyst at the Chertoff Group, and as Data Manager at the Chicago Project on Security and Threats. Mike has published articles and reports on cyber attacks, cryptography, and their implications for national security, human security, and international norms. He also serves as a Managing Editor for Charged Affairs, the official journal of Young Professionals in Foreign Policy. He is CompTIA Security+ certified. Mohammed Soliman is a Non-Resident Scholar with the Middle East Institute. His work focuses on the intersection of technology, geopolitics, and business in the Middle East and North Africa (MENA). Mohammed graduated from Georgetown University with a Masters of Science in Foreign Service. He started his career as an engineer in Cairo, a strategist with political parties and presidential campaigns, and a columnist for Arab and English publications. The episode was broadcast: 19/6/2020 US Arab Radio can be heard on wnzk 690 AM, WDMV 700 AM, and WPAT 930 AM. Please visit: www.facebook.com/USArabRadio/ Web site : arabradio.us/ Online Radio: www.radio.net/s/usarabradio Twitter : twitter.com/USArabRadio Instagram : www.instagram.com/usarabradio/ Youtube : US Arab Radio
NSA gives Microsoft a heads-up about a Windows vulnerability, and CISA is right behind them with instructions for Federal civilian agencies and advice for everyone else. Norway’s Consumer Council finds that dating apps are “out of control” with the way they share data. Ransomware goes all-in for doxing. The US pushes the UK on Huawei as Washington prepares further restrictions on the Chinese companies. And think twice before you book that alt-coin conference in Pyongyang. Johannes Ullrich from SANS Technology on malicious AutoCAD files. Guest is Chris Duvall from Chertoff Group with an overview of the current state of ransomware. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_15.html Support our show
Ben looks at the cozy relationship between Ring and local law enforcement, Dave shares a story about a DNA tests and search warrants. Our listener on the line wonders about deleted emails. Our guest is Michael Chertoff, former US Secretary of Homeland Security, now head of the Chertoff Group. Links to stories: https://gizmodo.com/ring-gave-police-stats-about-users-who-said-no-to-law-e-1837713840 https://www.nytimes.com/2019/11/05/business/dna-database-search-warrant.html Got a question you'd like us to answer on our show? Send your audio file to caveat@thecyberwire.com or leave a message at (410) 618-3720. Thanks to our sponsors KnowBe4, who's KCM GRC platform helps you get audits done in half the time, is easy to use, and is surprisingly affordable.
The use of disinformation isn’t new, but finding the truth has become more challenging as our adversaries employ sophisticated tools to manipulate perception. The Chertoff Group’s Adam Isles speaks with national security expert J.D. Maddox about the nature of disinformation campaigns, why companies should be concerned, and what can be done to prevent the spread of disinformation. He warns corporations that it’s a matter of time before sophisticated disinformation campaigns are used against them.
Ben looks at the cozy relationship between Ring and local law enforcement, Dave shares a story about a DNA tests and search warrants. Our listener on the line wonders about deleted emails. Our guest is Michael Chertoff, former US Secretary of Homeland Security, now head of the Chertoff Group. Links to stories: https://gizmodo.com/ring-gave-police-stats-about-users-who-said-no-to-law-e-1837713840 https://www.nytimes.com/2019/11/05/business/dna-database-search-warrant.html Got a question you'd like us to answer on our show? Send your audio file to caveat@thecyberwire.com or leave a message at (410) 618-3720. Thanks to our sponsors KnowBe4, who's KCM GRC platform helps you get audits done in half the time, is easy to use, and is surprisingly affordable.
While cybersecurity is often top of mind for many companies, physical threats such as active shooters are emerging as major risks to people and businesses too. The Chertoff Group’s Jayson Ahern discusses the roles and responsibilities of leadership in guarding against these threats, how chief security officers can work with the organization, and how often companies should assess their risks.
The Chertoff Group’s Brian Hess traces his career in the U.S. Air Force – from deployment to his work at the Pentagon as a Nuclear Security Policy Officer. He discusses how the lessons he learned in the military can apply to the corporate world. How can we break down the barriers that exist between physical and cyber within organizations? He stresses the importance of working with teams to guard against threats.
What is the state of the market when it comes to space and missile defence? The Chertoff Group’s Kristjan Kornmayer, who recently published the Space and Missile Defense Market Review, discusses a recent space and missile defence symposium and where he sees major areas of investment from the government and private sector.
The Chertoff Group’s Jayson Ahern talks about the importance of international supply chain security, and the delicate balance that must be maintained to keep goods flowing across our border. Public-private partnerships are setting standards to ensure legitimate goods come in, and the threats stay out. He discusses why companies need to understand – and guard against – risks in the international supply chain.
It’s been nearly 20 years since the terrorist attacks of September 11, 2001. The Chertoff Group’s Jayson Ahern, Charles Allen, Adam Isles, General Michael Hayden, and Lee Kair reflect on a day that changed America, and share stories about how it influenced their careers. They had a front-row seat to what happened on one of the country’s darkest days — and witnessed a nation that rose to the challenge.
How can the U.S. ensure the security of its elections and protect democracy? The Chertoff Group’s Adam Isles discusses vulnerabilities in election security and strategies to guard against attacks with Philip Reitinger, president and CEO of the Global Cyber Alliance. Reitinger talks about some basic steps to cut your cyber risk and cautions that the Internet of Things will present new challenges that we’ve yet to grasp.
Artificial Intelligence (AI) is the ability of computer systems and algorithms to simulate human responses and then learn and adapt. It holds great potential to bring innovation across a number of sectors. But it also raises a host of moral, legal and ethical questions. The Chertoff Group’s Paul Rosenzweig discusses the challenges and dilemmas this technology creates. How far are we willing to go in putting our faith in AI, and can we design it in a way that aligns with our values?
Artificial Intelligence (AI) is an incredibly powerful tool to help us make predictions, offering the promise of huge advances across all economic sectors and the government. But how do we define AI, what are its benefits, and how can it be applied in a way that’s consistent with our values? Carol Kuntz, a senior advisor with the Chertoff Group, discusses where AI is used today and some thoughts on how we govern its use in the future. She argues that the technology is at a place where public policy choices need to be made about its use.
The electric grid is often described as a lifeline sector for the nation’s critical infrastructure. But most of this sector is privately owned. How can the government and private sector work together to protect the nation’s critical infrastructure? The Chertoff Group’s Scott Gibson and Christian Healion discuss the new Cybersecurity and Infrastructure Security Agency (CISA) and how it can function as the public-private sector hub for understanding risk and helping the electric power industry achieve the twin goals of reliability and resiliency.
The Intelligence and National Security Alliance recently released a white paper on security clearance reciprocity - and how failures in policy and process are costing the government thousands of employee man hours. ClearanceJobs recently sat down with three members of INSA's Security Policy Reform Council: Charlie Allen, Principal, the Chertoff Group; Kathy Pherson, CEO, Pherson Associates; and Mary Edington, Director of Federal Security at KPMG to discuss the the white paper’s findings, and the history of security clearance reciprocity in government.
Cyber threats now rank as the number one threat against U.S. government and business interests. What can the government do to protect businesses against an onslaught of attacks? The Chertoff Group’s Adam Isles and Matthew Eggers of the U.S. Chamber of Commerce discuss the Cyber SAFETY Act – proposed legislation that would modernize an early law put into place after 9/11 to encourage the use of anti-terrorism technology. The legislation, among other things, incentivizes companies to take their product through the Department of Homeland Security’s SAFETY Act vetting process.
A changing business environment has meant that many companies outsource services and have multiple supply chains, introducing new risks from the outside. The Chertoff Group’s Chris Duvall talks about ways to manage third-party risk, the questions companies should be asking, and the looming threat of software subversion. He advises organizations to have a robust third-party program as part of any holistic risk-management strategy.
Organizations are facing increased cybersecurity threats. How should companies assess these risks and put a plan in place to prevent them? The Chertoff Group’s Adam Isles and Kurt Alaybeyoglu discuss MITRE’s ATT&CK threat assessment model that helps companies create individual plans to better understand risks, threats and ways to guard against them.
There’s no such thing as risk elimination. But if businesses focus on the most likely threats, they can minimize the damage. The Chertoff Group’s Adam Isles and Scott Gibson talk about how organizations can manage security risks effectively, the importance of monitoring those risks, and the convergence of both physical and cybersecurity threats.
A brief note to our listeners: Our “Global Threats” podcast was originally recorded on May 3, 2019. Since that time, additional events have occurred involving the regions we discuss on the podcast. Geopolitical realities can present risks for companies. The Chertoff Group’s Jonathan Paris, an expert in Middle East, US-China and transatlantic relations, provides regional insights and outlines the risks that Iran poses. What should global companies anticipate in the region?
Sometimes, the greatest risks to a company come from the inside. The Chertoff Group’s Lee Kair and Sean Horner discuss insider risk, why it happens and what can be done to identify and mitigate those risks. They stress the importance of continually monitoring behaviors that can indicate a red flag. And they offer insights on how a robust insider threat program can help all employees and help identify threats before problems arise.
Our devices are increasingly connected through the Internet of Things (IoT). What are the emerging risks associated with this connectivity? Adam Isles, a principal at The Chertoff Group, shares insights about the IoT environment and the need for standards in this space. He calls for security standards to be seamlessly integrated into the software development lifecycle.
In today’s podcast, we hear that Finland’s data protection authority is investigating reports that Nokia 7 Plus smartphones are sending data to a Chinese telecom server. Thousands of API tokens and cryptographic keys are exposed in public GitHub repositories. The US government warns that certain cardiac devices can be hacked from close range. A North Carolina county government is dealing with its third ransomware attack. And Magecart groups go after bedding companies. Malek Ben Salem from Accenture Labs with thoughts on securing the digital economy. Guest is Adam Isles from the Chertoff Group on supply chain risks. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_22.html Support our show
Reputational hits can cost a company and damage a business. What’s the role of business intelligence and due diligence when it comes to mitigating risk? The Chertoff Group’s Ben Joelson and Brogan Ingstad discuss the evolution of how companies have managed risk and the steps that should be taken – from mining open-source intelligence sources to navigating the Dark Web – to avoid reputational damage.
A cyber-enabled economic warfare (CEEW) attack designed to undermine America’s strength would have far-reaching strategic and economic consequences. Should such an attack occur, how would the U.S. government and private sector respond and what would they ask and expect of each other in the immediate aftermath? Dr. Samantha Ravich, chairman of the Foundation for Defense of Democracies’ Center on Cyber and Technology Innovation and David London, a senior director at The Chertoff Group, discuss what happened when senior leaders from the public and private sector came together to plan for such a scenario. They highlight the inter-dependencies in our economy and how we can work together to build resilience.
We often focus on cybersecurity, but physical security is just as important. How do companies take the lessons learned from organizations that have experienced tragedies and implement them to keep employees safe? The Chertoff Group’s Ben Joelson and Scott Gibson discuss technologies that could be part of the solution, and what happens when physical security and cybersecurity merge.
Drones have become ubiquitous for a number of commercial and consumer purposes. But what happens when drones land in the wrong hands? The Chertoff Group’s Ben Joelson and Phil Pitsky Vice President of Federal Operations for airspace security company Dedrone discuss the challenges and threats that drones can pose and what can be done under current law to protect from potential risks.
Kim Weaver, director of external affairs at the Federal Thrift Investment Board, discusses how the government shutdown affected the Thrift Savings Plan, and pending legislation to make loans and withdrawals easier for federal employees. Chris Cornillie, federal market analyst at Bloomberg Government, discusses what the increase in federal IT spending means for government technology, and details the emerging “AI arms race.” Lee Kair, managing director at the Chertoff Group, discusses new legislation to modernize technology and acquisition at the Transportation Security Administration, and how it could raise the “global standard.”
The black letter law and articles discussed in this episode are: National Emergencies Act of 1976 https://www.govinfo.gov/content/pkg/STATUTE-90/pdf/STATUTE-90-Pg1255.pdf Clinton v. City of New York 524 US 417 (1998) https://www.oyez.org/cases/1997/97-1374 INS v. Chadha 462 US 919 (1983) https://www.oyez.org/cases/1981/80-1832 Communications Act of 1934 as amended. Section 706 is found on page 323 https://transition.fcc.gov/Reports/1934new.pdf List of 58 declared national emergencies https://www.brennancenter.org/sites/default/files/analysis/NEA%20Declarations.pdf 50 USC 35 International Emergency Economic Powers Act https://www.treasury.gov/resource-center/sanctions/documents/ieepa.pdf Can President Trump Fund the Wall by Declaring a National Emergency? By Prof. Bobby Chesney on Lawfare https://www.lawfareblog.com/can-president-trump-fund-wall-declaring-national-emergency Declaring an Emergency to Build a Border Wall: The Statutory Arguments by Margaret Taylor on Lawfare https://www.lawfareblog.com/declaring-emergency-build-border-wall-statutory-arguments CRS Report for Congress on National Emergency Powers https://fas.org/sgp/crs/natsec/98-505.pdf What Can a President Do During a State of Emergency? In the Atlantic https://www.theatlantic.com/magazine/archive/2019/01/presidential-emergency-powers/576418/ NSLT episodes on sanctions and IEEPA Weaponizing the Dollar with Adam Smith https://soundcloud.com/nsltoday/weaponizing-the-dollar-with-adam-smith The Summer of Sanctions with Brian Egan https://soundcloud.com/nsltoday/the-summer-of-sanctions-with-brian-egan Jamil Jaffer is the founder of the National Security Institute at George Mason University https://www.law.gmu.edu/faculty/directory/adjunct/jaffer_jamil_n Paul Rosenzweig is a senior advisor at the Chertoff Group, a lecturer at George Washington University Law School and a senior fellow at the R Street Institute https://www.rstreet.org/team/paul-rosenzweig/
Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the purpose of the Committee on Foreign Investment in the United States (CFIUS), how it works and how we can encourage foreign investment without compromising security. He highlights some changes in the law that every company doing business in the United States should know.
When it comes to terrorist attacks, some of the biggest threats to security involve soft targets – airports, concert venues and nightclubs. Dr. J. Bennet Waters, who leads The Chertoff Group’s global Strategic Advisory Services, discusses ways to manage risk, be aware of threats and balance security with privacy with civil liberties. Keeping ahead of what our adversaries are doing – and sharing that information in a way that’s actionable – is critical.
While biometric technologies have been around for a long time, we’re now starting to see them in our day-to-day lives. From iris and fingerprint scans to facial recognition software, Lee Kair, managing director at The Chertoff Group, breaks down what we need to know about biometrics. Kair, an expert in aviation and transportation security, chats about how biometrics can be used to speed up travel processes while making them more secure. He argues that transparency will be critical as we balance the appropriate use of biometrics with privacy concerns.
When we think of insider cybersecurity threats to a business or government agency, we conjure images of spies working on behalf of a foreign government. But many insider threats are accidental, explains Bob Anderson, a principal in the Chertoff Group’s global Strategic Advisory Services. Anderson, who has been involved in investigating and arresting some of the most famous spies in U.S. history during his career with the FBI, breaks down the different categories of corporate threat — from the busy employee who inadvertently clicks on malware to those with more insidious aims. He offers insights on what makes a good insider threat program, why gaining employee trust is so difficult, and why corporate boards need to proactively examine their IT infrastructure and cybersecurity practices and procedures.
New legislation seeks to modernize the process by which foreign companies invest in the United States. What will this mean for companies looking to do business in the U.S.? Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the ins and outs of the Committee on Foreign Investment in the United States (CFIUS) and how companies can navigate the process. He talks about cases where foreign investors have stumbled in the process, why having a CFIUS advisor every step of the way is so crucial, and what the new legislation could mean.
Joe shares a kidnapping scam targeting foreign students. Dave describes social engineering involving robots. Our guest is Robert Anderson from the Chertoff Group, discussing Deep Fake technology and how it erodes trust. Links to stories mentioned in this week's show: https://searchsecurity.techtarget.com/news/252448458/Robot-social-engineering-works-because-people-personify-robots Thanks to our show sponsor KnowBe4.
Security threats are constantly changing. And while you can’t completely eliminate risk, you can learn to manage it. Adam Isles, a principal at The Chertoff Group, helps clients evaluate and mature their security risk management programs. He discusses steps to creating a sound risk management program, and how companies can assess, mitigate, and monitor threats. And he gets us thinking about what to do when the threats come from the inside.
From the infamous WannaCry to NotPetya, ransomware is a big business and has become the single most prevalent form of malware. Chris Duvall, senior director at The Chertoff Group and expert on security and risk management, discusses how ransomware spreads, how to prepare for a potential attack, and how to recover. Duvall offers insights about how organizations can respond and why having an independent evaluation of your security program can help prevent a disaster down the line.
In today's podcast, we hear that the Novichok attacks have brought Britain and Russia to the brink of cyberwar. The UK will take its case to the UN Security Council. Twitter and Facebook have completed their testimony on Capitol Hill, but investigation of tech's role in influence operations and public discourse continue. So do concerns about election security. Unpatched MikroTik routers are being exploited in the wild. OilRig shows some new tricks. Joe Carrigan from JHU ISI on biometric scanners tagging travelers at the border. Guest is Robert Anderson from the Chertoff Group with insights on the encryption debate. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_06.html
How do you know that your security program is effective? Mark Weatherford, senior vice president and chief cybersecurity strategist of vArmour and senior advisor at The Chertoff Group, weighs in on the role of a Chief Information Security Officer in an ever-changing cybersecurity landscape. He provides insights on managing the relationship with security vendors, the challenge of ransomware, and how a lack of talent is hurting the industry.
The black letter law and articles discussed in this episode: John Bolton gets rid of the “cyber czar” position in the NSC on Lawfare https://www.lawfareblog.com/boltons-magnificent-idea-nix-white-house-cyber-czar Cyber czar removal article on Ars Technica https://arstechnica.com/tech-policy/2018/05/trump-closes-job-opening-for-cyber-czar-raising-protests-from-congress/ Senator King and Senator Lankford question the intelligence community on cyber preparedness http://transcripts.cnn.com/TRANSCRIPTS/1802/13/ath.01.html Correction: The National Protection and Programs Directorate (NPPD) at DHS https://www.dhs.gov/national-protection-and-programs-directorate NIST Cybersecurity Framework 1.1 https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf Cybersecurity Information Sharing Act of 2015 https://www.dni.gov/index.php/ic-legal-reference-book/cybersecurity-act-of-2015 OPM hack https://www.lawfareblog.com/why-opm-hack-far-worse-you-imagine Hidden Cobra alert https://www.us-cert.gov/ncas/alerts/TA18-149A Proof of concept of a car hack https://www.wired.com/story/car-hack-shut-down-safety-features/ Ukrainian Power Grid hack https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf Bowman Dam, Rye Brook, New York SCADA system hacked https://www.nytimes.com/2016/03/26/nyregion/rye-brook-dam-caught-in-computer-hacking-case.html Paul Rosenzweig is a senior advisor at the Chertoff Group, a lecturer at George Washington University Law School and a senior fellow at the R Street Institute https://www.rstreet.org/team/paul-rosenzweig/ Paul’s Lawfare feed https://www.lawfareblog.com/contributors/prosenzweig Follow Paul on Twitter: https://twitter.com/@RosenzweigP
Episode 13 features Chad Sweet, Co-Founder and CEO of the Chertoff Group. Before joining the private sector, Chad served as the Chief of Staff of the Department of Homeland Security. With over a decade of investment banking experience, Chad has been involved in more than 40 successful sell- and buy-side M&A and capital formation engagements. 00000094 00000094 000020EF 00002152 0000A5EB 0000A5EB 00007D9C 00007BFB 00148C34 00148C34
The first months of the Trump administration have confirmed that criminal justice will remain a contentious issue for the foreseeable future. Trump's "law and order" rhetoric on the campaign trail has led to significant changes in federal criminal justice policy. At the state and local levels, lawmakers are struggling with the opioid epidemic, overincarceration, and how to work with new federal enforcement goals.In the current environment, how should legislators tackle the most serious and enduring criminal justice issues? What policies should be implemented? What should officials' priorities be? To answer these and other questions, experts from courtrooms, universities, law enforcement agencies, and think tanks will gather at the Cato Institute for its third annual criminal justice conference, Criminal Justice at a Crossroads. We hope that you will join us. Panel 3: Criminal Justice and the BorderDara Lind, senior reporter, Vox.comLaura Donohue, professor of law at Georgetown University Law CenterJay Ahern, principal and security services practice leader at The Chertoff Group and former acting commissioner of U.S. Customs and Border ProtectionModerated by Matthew Feeney, Policy Analyst, Cato Institute See acast.com/privacy for privacy and opt-out information.
Yahoo Finance was recently invited to 2017 Concordia Annual Summit and a few our reporters got to sit down with some of the best minds in the world. The following is the audio of 3 full interviews from Day 1. . First up is our Editor-in-Chief Andy Serwer speaking with Ian Bremmer, the Founder and President of the Eurasia Group. Next is Seana Smith with Arkansas representative French Hill. Finally, Alexis Christoforous with Michael Chertoff, Executive Chairman of the Chertoff Group and former Secretary of Homeland Security. Enjoy! See acast.com/privacy for privacy and opt-out information.
This Pilot Episode of Task Force 7 Radio will introduce your host, George Rettas, and the opening segment will provide a preview of what listeners should expect to hear in the pilot series of one the most anticipated business radio shows in the world. The show will also have as a special guest, former Secretary of Homeland Security and current Chairman of his own company, the Chertoff Group, the Honorable Michael Chertoff to talk about the proliferation of Nation State Cyber Security Attacks and what we need to do to protect ourselves against these threats. Secretary Chertoff will talk about whether or not we are engaged in a Cyber War with other countries, how Cyber Attacks affect global geo-politics, and how responsible is the government in protecting the critical systems of our Fortune 500 Companies.
In today's podcast, we hear that WikiLeaks has dumped "Dumbo" project documents. Separation of agencies as a way of rendering leaks less likely. HBO's hack is getting bigger, apparently. Group IB outs members of the United Islamic Cyber Force to Interpol. Cerber goes after Bitcoin. WannaCry ransom payments are being moved, perhaps laundered. Lawsuits loom over NotPetya as more companies warn the malware had a material effect. The FBI says you can't exercise your right to be forgotten by DDoS. Election fraud in Venezuela. Markus Rauschecker from UMD CHHS on large companies like FaceBook and Google being vulnerable to privacy and antitrust concerns. Jim Pflaging from the Chertoff Group, promoting their upcoming Security in the Boardroom event, speaking to the role of the board director when it comes to cyber security.And your guests can eavesdrop on you through your Amazon Echo. (But why would you have those people over anyway?)
Last year, hackers used malware to steal $101 million remotely from a Bangladesh bank from thousands of miles away. Cyberattacks can be as debilitating and dangerous as conventional warfare — particularly in the financial sector, where a single attack could cripple or disrupt global financial systems. This kind of cyber-attack is emerging as a new frontier of potential conflict between nations. Yet there are no norms or policies governing the prevention of cyber financial attacks. So how can countries work together to prevent attacks on financial markets and institutions from rogue nations, and even non-state actors? Tom Carver discussed the threat with Michael Chertoff, former U.S. Secretary of homeland security, and Tim Maurer, co-director of Carnegie's Cyber Policy Initiative. Michael Chertoff is the co-founder and executive chairman of the Chertoff Group. He served as Secretary of the U.S. Department of Homeland Security from 2005 to 2009. (More on Chertoff - https://www.chertoffgroup.com/about-us/our-team/205-michael-chertoff) Tim Maurer is a fellow at the Carnegie Endowment for International Peace and co-directs its Cyber Policy Initiative. He is currently writing a book on cybersecurity and proxy actors. (More on Maurer - http://carnegieendowment.org/experts/1086)
April 27, 2017 Craig Wolfley is back in the Wolf's Den Studio at the Pittsburgh Podcast Network this week with Pittsburgh native, General Michael Hayden (North Catholic, Duquesne), the only person ever to hold both positions of Director of the CIA and the NSA. Topics include the passing of Steelers owner Ambassador Dan Rooney, growing up on Pittsburgh's North Side, top level government, politics and General Hayden’s book “Playing to the Edge: American Intelligence in the Age of Terror”. The Craig Wolfley Podcast is proudly sponsored by J & D Waterproofing. Call them at 1-800-VERY-DRY or JDwaterproofing.com LISTEN to the PODCAST show right here below. ALL WAYS TO LISTEN: – The Craig Wolfley Podcast is free and available to listen 24/7/365 worldwide. Audio On-Demand in your hand on smartphone, tablet, laptop and desktop computers. Search...Craig Wolfley Podcast on most listening platforms and the shows are delivered to your feed. – APPLE users can find us on the iTunes and Podcast app. – ANDROID users can find us on Google Play Music – ALSO available to listen by any user on ALL computers, tablets, and smartphones via SoundCloud, Stitcher or Tunein More About General Michael Hayden: Michael Hayden is a retired United States Air Force four-star general and former Director of the National Security Agency, Principal Deputy Director of National Intelligence, and Director of the Central Intelligence Agency. He is currently a principal at the Chertoff Group, a security consultancy founded by former Homeland Security Secretary Michael Chertoff. Hayden also serves as a Distinguished Visiting Professor at George Mason University School of Public Policy. You can get General Hayden's book, “Playing to the Edge: American Intelligence in the Age of Terror”, at amazon.com and other retailers. PODCAST TWITTER FOLLOWS: @CraigWolfley, @TunchandWolf, @Steelers, @LightOfLife, @talentnetworktv, @PghPodcast, @JDWaterproofing @GenMhayden CRAIG WOLFLEY BOOKINGS, INQUIRIES, CONTACT THE PODCAST talent network, inc. David Sedelmeier mail@talentnetworkinc.com Exclusively Produced at talent network, inc. by Pittsburgh Podcast Network
Michael Hayden is a retired United States Air Force four-star general and former Director of the National Security Agency, Principal Deputy Director of National Intelligence, and Director of the Central Intelligence Agency. He is currently a principal at the Chertoff Group, a security consultancy founded by former Homeland Security Secretary Michael Chertoff. Hayden also serves as a Distinguished Visiting Professor at George Mason University School of Public Policy. He is the author of Playing to the Edge: American Intelligence in the Age of Terror.
President-elect Trump has made counterterrorism a focal point of his administration. The disciplined use of metadata, surveillance, intelligence collection, and information sharing is vital to counterterrorism efforts. Drawing on his former experience as a prosecutor, judge, and the second United States Secretary of Homeland Security, the Hon. Michael Chertoff offered guidance on how these tools can be used most effectively to protect against security challenges such as crowd-sourced terrorism and hostile nation states. -- Featuring: Hon. Michael Chertoff, Senior Of Counsel, Covington & Burling LLP and Executive Chairman and Co-Founder, The Chertoff Group.
Kate Moore, chief equity strategist at BlackRock, says nimble and different companies are capturing growth. Mohamed El-Erian, chief economic adviser at Allianz, says a low-growth economy is giving rise to the politics of anger. Michael Chertoff, chairman of the Chertoff Group, says Yahoo's failure to disclose the hacking of 500 million accounts will have an impact on the merger with Verizon. John Engler, Business Roundtable president and a former three-term governor of Michigan, says we need to retrain people who have lost jobs to fit with our new economy. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Kate Moore, chief equity strategist at BlackRock, says nimble and different companies are capturing growth. Mohamed El-Erian, chief economic adviser at Allianz, says a low-growth economy is giving rise to the politics of anger. Michael Chertoff, chairman of the Chertoff Group, says Yahoo's failure to disclose the hacking of 500 million accounts will have an impact on the merger with Verizon. John Engler, Business Roundtable president and a former three-term governor of Michigan, says we need to retrain people who have lost jobs to fit with our new economy.
General Michael V. Hayden, former Director of the National Security Agency and the Central Intelligence Agency, and retired United States Air Force four-star general, joined us to discuss his new book, Playing to the Edge: American Intelligence in the Age of Terror, his memoir as a career intelligence officer and leader. Though the book covers the arc of his entire professional life, our Teleforum focuses primarily on the cyber world, which General Hayden describes as “a domain of conflict and cooperation whose importance seems to grow by the hour” couched “in an era of shrinking trust in government and expanding global threats." -- Featuring: General Michael V. Hayden Principal, The Chertoff Group, Former NSA and CIA Director. Moderator: Prof. Jamil N. Jaffer, Adjunct Professor and Director, Homeland and National Security Law Program.
In this podcast, CMS’s Executive Director Donald Kerwin speaks with Michael Chertoff, former Secretary of the US Department of Homeland Security (DHS), on the intersection between international migration, refugee protection and national security. Secretary Chertoff discusses the lessons learned from 9/11 terrorist attacks, the security of the US refugee resettlement and visa waiver programs, proposals to bar Muslim immigrants from admission and to build a fence the length of the US-Mexico border, and the need for broad immigration reform. Michael Chertoff served as DHS Secretary from 2005 until 2009. Appointed by President George W. Bush, he was instrumental in developing and implementing the administration’s homeland security and immigration enforcement priorities. He also played a lead role in advocating for comprehensive immigration reform legislation. Prior to leading DHS, Secretary Chertoff served as a federal judge on the US Court of Appeals for the Third Circuit from 2003 to 2005, the Assistant Attorney General for the Criminal Division at the Department of Justice from 2001 to 2003, and worked for more than a decade as a federal prosecutor. Upon retiring from public service, he co-founded the Chertoff Group, which provides high-level strategic counsel to corporate and government leaders on a broad range of security issues. He currently serves as Co-Chair of the Bipartisan Policy Center (BPC) Immigration Task Force.
Former NSA and CIA director Michael Hayden joins The Cybersecurity Podcast to talk about his new book, "Playing to the Edge: American Intelligence in the Age of Terror." Hayden – now a principal at The Chertoff Group – discusses the need to balance national security secrets and the public's right to government transparency, his reaction after Edward Snowden revealed details from mass surveillance programs he started, and why he's siding in favor of strong encryption for consumers. Also joining New America's Peter Singer and Passcode's Sara Sorcher this episode is Federal Trade Commissioner Julie Brill. They talk about "Privacy Shield," the new agreement governing transatlantic data flow agreement between the US and the EU. They also discuss why Europeans think America is the "Wild West" when it comes to privacy policies, what more companies can do to ensure they are respecting consumers' rights, and what's at stake for privacy with the burgeoning Internet of Things.
Cyber Intelligence and Security after the OPM breach with Charles Allen - Chair, INSA Security Policy Reform Council; Principal, The Chertoff Group (invited) Michelle Van Cleave - Former U.S. National Counterintelligence Executive Steve Weis - Vice President, ZeroFOX Social Media Cyber Security and moderator Michelle Watson, Vice President for Corporate Relations, IWP Thursday, October 22 The Institute of World Politics This event is part of The Cyber Intelligence Discussion Series co-hosted by The Institute of World Politics and the Intelligence and National Security Alliance (INSA).
In our sixtieth episode of the Steptoe Cyberlaw Podcast, Stewart Baker and Michael Vatis are joined by Paul Rosenzweig, founder of Red Branch Consulting PLLC and Senior Advisor to The Chertoff Group to discuss: Australia and Belarus embracing data retention as the EU backs away; the US taking its concern over China's proposed technology regulations to the World Trade Organization; Section 230 of the Communications Decency Act is still a hot topic in cyberlaw; whether Florida's intercept law has been eviscerated by the 11th Circuit; the House cybersecurity information sharing bill; the latest developments in ICANN; and Germany’s privacy laws and what role they played in the Germanwings crash. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
Co-hosted by the McCain Institute and Intelligence Squared-U.S., “Spy On Me, I’d Rather Be Safe” discusses the complex choices facing our nation concerning government surveillance, personal privacy, and public security. Panelists include Stewart Baker, former Assistant Secretary for Policy at the Department of Homeland Security; David Cole, Professor of Law at the Georgetown University Law Center; Richard Falkenrath, Principal at the Chertoff Group and former Deputy Homeland Security Advisor; and Michael German, Senior Policy Counsel for the American Civil Liberties Union. Author and ABC News correspondent John Donvan serves as moderator. This event originally took place on November 20th, 2013 in Washington, DC.
Co-hosted by the McCain Institute and Intelligence Squared-U.S., “Spy On Me, I’d Rather Be Safe” discusses the complex choices facing our nation concerning government surveillance, personal privacy, and public security. Panelists include Stewart Baker, former Assistant Secretary for Policy at the Department of Homeland Security; David Cole, Professor of Law at the Georgetown University Law Center; Richard Falkenrath, Principal at the Chertoff Group and former Deputy Homeland Security Advisor; and Michael German, Senior Policy Counsel for the American Civil Liberties Union. Author and ABC News correspondent John Donvan serves as moderator. This event originally took place on November 20th, 2013 in Washington, DC.