Effective AI Oversight: Chertoff and Isles in Directors and Boards

As AI adoption accelerates, boards must rethink how they oversee technology risk. In a new piece published in Directors & Boards, Chertoff Group Executive Chairman Michael Chertoff and Head of Cybersecurity Adam Isles describe what effective AI security and safety oversight requires in a technology environment that is evolving in real time. The Core Message The […]
Golden Dome and the New Federal Buying Reality

Summary How Execution and Governance Are Reshaping Competition Our recent analysis of how agencies are making buying decisions in 2026 and beyond identified a clear shift: speed, portfolio governance and outcome-driven acquisition are now the defining forces in Federal procurement. Golden Dome puts that shift in concrete terms. More than a missile defense initiative, Golden […]
Coast Guard Investments Improve Readiness

The Chertoff Group‘s Aaron Roth writes in National Defense Magazine about the benefits of a well-funded U.S. Coast Guard. With $25 billion in new funding, Coast Guard investments will improve mission readiness, replace aging cutters and increase personnel. This will enhance performance in crucial areas including border security, drug enforcement, cybersecurity and disaster response. This […]
A Window Sticker for Software

How Buyers Can Use Performance Measures to Drive Better Security in Software Products Every modern organization relies on software and systems that it cannot create for itself. Whether that be small office automation software, larger enterprise applications, or hundreds of Internet-based services, the organization depends on that software to meet its business goals. The number […]
The Latest Cybersecurity Executive Order: Implications and Guidance

What happened On June 6, President Trump signed an Executive Order (EO) “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity.” The EO sustains efforts to strengthen the Cybersecurity and Infrastructure Security Agency’s (CISA) role in defending civilian Federal networks, bolsters protections against foreign cyber threats and advances secure technology practices in critical sectors. The EO also amends […]
Michael Chertoff on U.S. Tech Strategy and Priorities

On April 11, Chertoff Group Executive Chairman and Co-Founder Michael Chertoff delivered remarks on U.S. tech strategy and priorities amid growing competition from China at an event hosted by the New Lines Institute for Strategy and Policy. He touched on topics including technology innovation and artificial intelligence (AI), access to rare earth minerals for tech […]
Preparing for Sensitive Personal Data Security Requirements

On April 8, a U.S. Department of Justice (DOJ) rule took effect that restricts the handling of U.S. personally identifiable information (PII), where companies or their employees, vendors or investors have touchpoints in China, Russia and other countries of concern. Background and Key Provisions The Final Rule, published in December 2024, applies to “covered data […]
How Can Directors Approach the Topic of AI?

Chertoff Group Executive Chairman and Co-Founder Michael Chertoff participated in a conversation about the rapidly evolving topic of AI that took place at MLR Media’s 2024 Character of the Corporation conference late last year. The discussion also included Samantha Kappagoda, director and nominating chair, Credit Suisse Funds; Valerie Mosley, director, DraftKings. John Bremen, managing director, […]
How Will the Department of Government Efficiency (DOGE) Impact GovCon?

Today, President Donald Trump was sworn in for a second, nonconsecutive term after the historic November 2024 election. As highlighted on the campaign trail, Trump’s Administration will bring with it an unprecedented challenge to the status quo of government operations, inviting important discussions about government size, efficiency and efficacy. Prior to taking office, Mr. Trump […]
Executive Protection: Ben Joelson Speaks with CNBC

Chertoff Group Principal and Head of Security Risk & Resilience Ben Joelson spoke with CNBC reporter Bertha Coombs about how corporate security leaders are reconsidering their priorities in the wake of the shooting of United Healthcare CEO Brian Thompson.
Salt Typhoon Amplifies Why End-to-End Encryption is Essential

Introduction Adam Isles and Andreas Kurland from our Cybersecurity team discuss the infiltrations of the Salt Typhoon security breach with the CISO Tradecraft podcast. As the U.S. government reveals that intrusions into telecom companies are deeper, more wide-spread and more severe than previously known, it is essential to incorporate end-to-end encryption into communication methods. What […]
Eliminating Foreign Influence in Federal Contracting

In an age of amplified global tensions and heightened cybersecurity threats, the U.S. government has sharpened its focus on potential foreign influence in the federal contracting space. For contractors planning to acquire and maintain government business, understanding and preparing for this increased scrutiny is no longer optional—it’s a necessity.
Chad Sweet Speaks about Election Interference at Columbia

As the November presidential election approaches, American intelligence officials are warning of escalating foreign interference efforts by adversaries seeking to undermine trust in democratic institutions and influence U.S. politics.
Recent China-Based Cyber Attacks Highlight U.S. Tech Vulnerability

China’s aggressive operations to infiltrate the United States’ networks pose a significant security threat to the Nation’s critical infrastructure. China backed attacks, often referred to as Typhoon attacks, have focused on the US technology sector, targeting multiple layers of network infrastructure.
Mapping the Cuckoo’s Egg

Using MITRE’s catalogued techniques, we can explain to a non-technical audience how these concepts apply today, demonstrating that foundational security principles from as far back as 1986 are still relevant.
Chad Sweet on CNBC: Pager and Radio Supply Chain Attack

Chertoff Group CEO and Co-Founder Chad Sweet joined CNBC’s ‘Power Lunch’ on September 20 to discuss how last week pager blast in the Middle East was carried out, the potential impact for U.S. companies and more.
Aaron Roth Discusses Hurricane Risk to Oil Tankers

Aaron Roth discusses the risk of hurricanes to oil tankers and the best ways the vessels adn crews can stay safe.
Ben Joelson Explores How AI Will Improve OSINT

AI will create efficiencies for corporate security teams who use OSINT to proactively monitor social media and other online sources for signs and signals of potential harm.
Michael Chertoff Collaborates with EqualAI

The increased integration of AI technology into our daily lives and operations raises pressing legal questions for lawyers, executives, policy makers and judges around how AI fits into our current legal frameworks. To help answer the call in preparing key stakeholders to address this critical concern, EqualAI collaborated with Chertoff Group Co-Founder and Executive Chairman […]
Chad Sweet Discusses 2024 Election Interference

In the modern world, the Internet and social media are domains of conflict. Our adversaries have used false information to attempt to manipulate us for many years. While it is nothing new, it is easier now in our high-tech world where nation states aim to undermine public confidence and exacerbate political polarization.
Memories of 9/11

As Americans, we give thanks for the freedoms we hold dear. Nearly 3,000 people were robbed of those freedoms 23 years ago. On this day we remember the lives lost and the lives forever changed on 9/11. From the remnants of that day a Mission was born. We pledged to never forget and to strive to never to allow such an egregious act of terror to happen again.
Ben Joelson appears on NewsNation to discuss Taylor Swift concert terror plot

Recent attacks in Europe are putting a spotlight on the sort of terrorism threats that U.S. officials have warned about. Most recently, two suspects, apparently inspired by the Islamic State group and al-Qaida, were arrested in connection to an apparent plot to attack Taylor Swift shows in Vienna, Austria. On August 8, Principal and Head […]
“Failure Is Not an Option:” How Contractors Can Develop Effective Capture Plans

In the summer of 1995, the film “Apollo 13” captivated audiences as a blockbuster hit, recounting the harrowing true story of a seemingly routine mission to the moon that turned into a life-or-death struggle when an oxygen tank exploded, crippling the spacecraft. The crew, led by astronaut Jim Lovell, had to rely on their ingenuity […]
Chertoff experts take to the airwaves in midst of CrowdStrike Outage

The CrowdStrike outage that crippled business operations on Friday July 19, including aviation and health care, highlights the need for organizations to safeguard the resiliency of critical systems. Chertoff Group cyber leaders including Michael Chertoff, Chad Sweet, Adam Isles, David London and Lee Kair provided commentary to networks including CNBC, CBS, FOX and NewsNation. As […]
Ben Joelson Discusses Assassination Attempt

Principal and Head of Security Risk and Resilience Ben Joelson, discusses the complexities of campaign security and executive protection, how detecting lone wolf attackers before they strike challenges security stakeholders, and the impact that the assassination attempt will likely have on campaign security moving forward.
ICYMI: The Federal Circuit Just Issued One of the Largest Wins Ever for Commercial Companies

The Federal Circuit’s decision in Percipient.ai, Inc. v. United States, CACI, Inc. expands our understanding of “interested parties” who are allowed to bring forth protests alleging federal government agencies and their contractors are “economically impacting” their interests.
Cyber is the New Battleground

Calling cyber the new battleground, Michael Chertoff said cybersecurity protection today is not about trying to build an impenetrable wall around your information technology infrastructure, but having layers of defense that enable you to mitigate problems when they arise.
Security DNA Podcast Interviews Chertoff on Global Risk

Michael Chertoff reveals the trends he sees at the convergence of cyber, physical and geopolitical risk in an interview with Security DNA podcast host Steve Lasky.
Record Numbers of Summer Air Travelers Take to the Skies

As record numbers of passengers take to the air this summer, pack your patience and leave your firearms at home.
Governments Should Consider the Impacts of the EU’s Digital Markets Act Before Adopting Similar Regulations

In a column published today in Real Clear Policy, Michael Chertoff, co-founder and executive chairman of The Chertoff Group calls for caution as governments consider legislation similar to the EU Digital Markets Act.
Voice of the Customer: A Key To Unlocking Contracting Success

The Chertoff Group Federal Strategy team is passionate about sharing insights and best practices that drive success in the world of government contracting. Today, we’re diving into a topic that lies at the heart of our approach: the importance of listening to the voice of the customer.
Adam Isles comments to CNBC on Cyber Risks

CNBC’s Lori Ann LaRocco interviewed Adam Isles, Principal and Head of The Chertoff Group’s Cybersecurity Practice, about cyber concerns within critical infrastructure sectors including intrusions at water treatment facilities and risks to U.S. Ports.
How federal contractors can close deals with only 6 months remaining in FY24

The government has six months left to spend FY24 funds; decisions will be made quickly. Are you ready to act and capture business?
Key Bridge Collapse Aftermath: CNBC Reports

CNBC talks with Chertoff Group experts in the aftermath of Key Bridge collapse.
AI-generated disinformation could threaten the 2024 elections

AI-generated deep fakes, or digitally manipulated photos, video, and audio have emerged as an influence in politics and have already been used maliciously in the 2024 election cycle.
Adam Isles Talks Water Plant Cyber Threats on CNBC

This morning, Adam Isles, Chertoff Group principal and head of Cybersecurity, joined host Becky Quick on CNBC’s Squawk Box to discuss the latest threats to U.S. water critical infrastructure. Earlier this week, the U.S. government warned of nation state cyber threats from Iran and China. According to White House National Security Advisor Jake Sullivan, “These […]
Aaron Roth discusses DHS budget uncertainty with HNGN News

Aaron Roth outlines the current DHS budget impasse in an interview with HNGN.com
As Published in Directors and Boards: The Directors AI Checklist

In this article Michael Chertoff and Alan Grafman detail the risks board members should consider as they navigate AI.
As Published in Rigzone: Aaron Roth Speaks about Offshore Risks

In an interview with Rigzone, The Chertoff Group’s Aaron Roth speaks about offshore risk to oil and gas personnel with reporter Andreas Exarheas.
Is Cyber Enforcement the Right Approach to Reduce Risk?

Companies are being targeted by increasingly sophisticated cyber threats.. Good faith collaboration between government and the private sector is needed, write Michael Chertoff and David London in Homeland Security Today.
Winning the Super Bowl of Security: An Offense-Informed Defensive Strategy

The Chertoff Group and Trustwave preview a joint offering and discuss parallels between cyber defense and football. In both football and cybersecurity, resiliency is key to success. And while cyber risk can’t be eliminated completely, resilience can be achieved.
Gov’t should consider a cyber insurance backstop

The U.S. should consider a cyber insurance “backstop” in line with the Terrorism Risk Insurance Act (TRIA) passed after the 9/11 terrorist attacks.
Aaron Roth speaks to Rigzone about Houthi Strikes in Red Sea

Aaron Roth, a principal and head of Federal Strategy at the Chertoff Group, told Rigzone the recent incident in the Gulf of Oman differs slightly from attacks in the Red Sea “given this vessel was involved in a previous dispute between the U.S. and Iran (sanctioned oil)”.
AI deep fakes threaten fair elections in 2024

In a January 11 Newsweek article by Michael Chertoff and former Danish Primer Minister and NATO Secretary General Anders Fogh Rasmussen explore the threat of deep fakes to fair elections.
Michael Chertoff Interviewed by The Washington Post on Paris Olympic Security

Michael Chertoff shares large event security expertise and risks of concern with the Washington Post.
Pack your patience when traveling as disruptive behavior is costly

USA Today published an opinion piece by Lee Kair about the need for civility in air travel and the costly consequences when passengers lose their cool at the checkpoint or while in flight.
Ambassador Ken Braithwaite appears on FOX and BBC

Chertoff Group Senior Advisor Ambassador Kenneth Braithwaite appeared on major news networks to discuss the U.S. Navy’s presence in the Eastern Mediterranean as a deterrent force in the region.
IDF ‘trying to control the narrative’ as Hamas vows to resume war after cease-fire

Chertoff Group Senior Advisor General John Wharton (U.S. Army Ret.) talks with NewsNation host Nichole Berlie about the ongoing ceasefire and release of hostages in the Israel-Hamas war.
Biden and Xi discuss AI as Executive Order Implementation Begins

The executive order attempts to harness AI’s technological advances across a wide variety of industry sectors while mitigating significant national security risks and challenges associated with misuse.
SEC Enforcement Action Against SolarWinds and its CISO

The SEC filed a civil complaint alleging that SolarWinds and its CISO, violated federal securities laws by misstating the company’s cybersecurity practices and its heightened cybersecurity risks.
Michael Chertoff discusses the threat of Iranian Cyberattacks on U.S.

“I could envision the possibility — we have to be prepared for this — of an effort to attack our critical infrastructure or our electric grid, our, for example, air traffic system, water,” said Michael Chertoff, the former secretary of Homeland Security under the Bush administration.
Chertoff Group’s Lee Kair appears on BEST8A Podcast

Lee Kair the leader of Federal Strategies and Security Risk & Resilience at The Chertoff Group joins host Ezekiel Russell, on the BEST8A Podcast to discuss federal contracting best practices.
Michael Chertoff discusses the potential for homeland threats with Catherine Herridge of CBS

CBS’s Catherine Herridge interviewed Michael Chertoff on federal law enforcement’s warning of growing risks here in the United States given the Israel-Hamas war.
Supply chain resiliency is crucial as geopolitical risk grows, says Chertoff Group’s Chad Sweet

Sweet discussed the cascading effects from the Middle East crisis and the growing need for risk management and business continuity planning.
Bureau of Industry and Security Releases Updated Semiconductor Export Controls

BIS issued interim final rules that restrict exports of a greater range of semiconductors and semiconductor manufacturing equipment to China and expand licensing requirements to U.S. arms embargoed countries.
The Future of Cities Partially Hinges on the Effectiveness of Retail Security Programs

Retailers are at the forefront of this struggle for the future of cities. They face a complex set of risks: proximity risk to nearby criminal activity, on-premises crime against customers and employees, and persistent theft that is both organized and opportunistic.
Impacts to Business Given the Evolving Situation in Israel (October 11)

Israel is now an active war zone and has established an emergency unity government with a war cabinet.
Future of Democracy Discussion with Rice and Chertoff

Michael Chertoff, former Secretary of Homeland Security and co-founder and executive chairman of The Chertoff Group recently participated in a panel discussion on the Future of Democracy at the Global Emerging Technology Summit.
Michael Chertoff in Bloomberg Law: AI Needs Proactive Guardrails Across Industries

Bloomberg Law recently published an op-ed by Chertoff Group Co-Founder and Executive Chairman Michael Chertoff on why the risks of AI must be addressed and guardrails established. Secretary Chertoff penned the article in his capacity as a special adviser on the American Bar Association Artificial Intelligence Task Force. “Because AI promises to transform virtually every […]
AI Use Desperately Needs Proactive Guardrails Across Industries

While AI promises to transform almost every sector and holds great promise, it can also pose significant risk. It is critical for individuals and companies relying on AI to develop guardrails to manage the technology.
Michael Chertoff Weighs in on the Risks of Artificial Intelligence with News Nation

Brook Shafer of News Nation covers a new report from the U.K. that shows artificial intelligence can steal passwords with 95% accuracy just by listening to keystrokes. Last week, tech leaders and senators met behind closed doors to discuss the risks of AI. Congress and the White House have been pressing tech companies to create […]
Michael Chertoff appears on In AI We Trust Podcast in his role as an advisor to the American Bar Association’s Task Force on Law and Artificial Intelligence

In this podcast, In AI We Trust, by EqualAI, Chertoff Group Co-Founder and Executive Chairman Michael Chertoff discusses the ways in which Artificial Intelligence is changing the legal landscape with co-panelist, Lucy Thompson, chair of the American Bar Association AI Task Force. The episode is co-hosted by EqualAI CEO Miriam Vogel and Karyn Temple, long-time […]
Outbound Investment Executive Order (14105)

Executive Order 14105 dramatically expands the Treasury Department’s purview to include U.S. private sector overseas investment in areas of national security concern, namely semiconductor and micro-electronics, quantum information technologies, and artificial intelligence.
Chertoff Group Cybersecurity Leaders Appear on the CISO Tradecraft Podcast

Chertoff cybersecurity experts Adam Isles and David London appear on CISO Tradecraft, the podcast that provides the information, knowledge, and wisdom to be a more effective cybersecurity leader.
Climate Migration as a National Security Issue: Michael Chertoff interviews with The Burn Bag Podcast

In this episode, Michael Chertoff interviews with The Burn Bag podcast host Andre Gonawela about climate migration as a national security issue in his role with the Climate Migration Council.
SEC Publishes Public Company Cybersecurity Disclosure Final Rule
On July 26, the U.S. Securities & Exchange Commission (SEC) adopted its Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure. The final rule is a significant expansion of disclosure requirements for “material” cybersecurity incidents.
Security as a business enabler. How to measure, analyze and assess your program

Leverage data and insight to make efficient decisions and position your security program as a business enabler
Podcast with our partner Virtru: Lessons Learned from the Microsoft Outlook Breach

In this podcast hosted by Virtru’s Rob Mc Donald, experts, including Chertoff Group’s David London and Michael Wilkes, discuss the Chinese hack on Microsoft’s cloud-based Outlook email systems. The breach resulted in unauthorized access to multiple Microsoft customer accounts, including government agencies. The attack raises concerns about relying solely on centralized cloud systems for cyber […]
CONTINUING IMPACTS FROM EXPLOITATION OF MOVEit VULNERABILITY

U.S. Government agencies as well as many private companies were impacted by a rapidly expanding cyber attack attributed to exploitation of Progress Software’s MOVEit file transfer platform by the Russian Clop Ransomware Gang.
Secretary Chertoff discusses geopolitical risk with Elizabeth Vargas on NewsNation

EV: How do you advise clients who are doing business in China? MC: First, how do you protect your cyber assets and intellectual property? Second, how do you protect your people if you have people in China? And third, do you want to rely on China as your sole source for critical elements of your […]
Secretary Chertoff Describes Working Under President Bush, Taking Down Enron and Building the Patriot Act on Eyewitness History Podcast

In an exclusive interview, Secretary Michael Chertoff, renowned security expert and co-founder of The Chertoff Group, spoke with Josh Cohen of the Eyewitness History podcast.
How data-centric security combined with zero-trust can solve our information sharing challenges

In this insight piece, published by SC Media, Michael Chertoff and Virtru CEO John Ackerly make the case for zero-trust and data-centric security (DCS) controls as a solution to the dual challenge of classified data leaks and the need to swiftly share sensitive data with those who have a legitimate need to know. Zero-trust assumes that […]
CISA Secure Software Self-Attestation Common Form: Procurement and Regulatory Implications

On April 27, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a Request for Comment on the much-anticipated Secure Software Self-Attestation Common Form. Organizations that supply the U.S. Government with software products must prioritize software security efforts and compliance.
Harvard Business Review: Cyber Risk Is Growing. Here’s How Companies Can Keep Up

The Chertoff Group, a global advisory services firm that helps our clients manage risk and position for strategic growth, with focus on resilience.
Point of View: 2023 National Cybersecurity Strategy

On March 2, the Biden Administration released a new National Cybersecurity Strategy.
Reflections on the Munich Security Conference and the First Anniversary of Russia’s War Against Ukraine

Former Homeland Security Secretary Michael Chertoff shares reflections on the Munich Security Conference and the first anniversary of the Russia-Ukraine war.
While Hive ransomware disruption is a win, many organizations remain unprepared

Top ransomware organization, Hive, was disrupted by global law enforcement. Ransomware paralyzes an organization by locking systems and files, rendering crucial data inaccessible.
Chertoff Group Leaders Share Insights on the 2022 National Defense Strategy

The NDS succeeds in framing the new global threat environment, and the resourcing, campaigning, and inter-departmental collaboration required to equip and support U.S. and allied forces.
Commercial Satellites at Risk in Russia-Ukraine Conflict

Putin has shifted the focus from the land war in Ukraine to space, stating that commercial satellites could be legitimate targets for retaliatory attacks.
New government directives and persistent threats reinforce urgency of securing software

Given the heightened cybersecurity threats and coming regulations, it™s important to reduce risk and achieve compliance with software best practices.
An Updated Privacy Shield at Last?

President Biden has put the U.S. on a path to restoring the Privacy Shield agreement.
Cyber Disclosure and Attestation: Recent Regulatory and Legislative Developments Heighten Expectations

Three recent notable regulatory and legislative developments are significantly heightening expectations on cybersecurity disclosures and attestations.
Security Bulletin: Software security threat and regulatory environment heightens risk and compliance pressures

Over the last month, notable threat activity and U.S. Government regulatory pronouncements have highlighted the evolving technology supply chain security risk surface and the need for focused mitigation measures.
The War in Ukraine: Guidelines for Businesses on Rapid Withdrawal from Conflict Zones and Contested Environments

Guidelines for Businesses on Rapid Withdrawal from Combat Zones and Contested Environments
Ukraine Bulletin-Update
This is an ongoing war-time situation and business entities need to make plans to mitigate the increased risk of operations in and around Ukraine, as well as prepare for widespread sanctions and potential Russian retaliation.
Ukraine Bulletin
The ongoing hostilities and cyberattacks in Ukraine are elevating risks not only to businesses and organizations in Ukraine, but to entities well beyond Ukraine™s borders. The Chertoff Group offers some suggestions on areas and issues to be mindful of in wake of the situation.
The Critical Impacts of Continuing Resolutions and How to Navigate Them

Threats of government shutdowns and stopgap funding measures seem to have become standard operating procedure for the U.S. federal budget process.
Change is coming. How will evolving cyber risk and incident disclosure requirements affect your company?
The SEC 2018 interpretive guidance on cybersecurity disclosure requirements makes it clear that public companies should have comprehensive cybersecurity policies and procedures in place with a focus on timely disclosure of material cyber risks and incidents.
Ukraine Cyber Attack Bulletin
On Friday January 14, 2022, in the aftermath of unproductive diplomatic meetings between Russia and the U.S. and NATO, malicious cyber attackers launched a massive attack against Ukrainian government websites.
Tis the Season for Cybercrime: Six Ways to Make Your Organization Safer This Holiday

It™s important to remember, though, that cybersecurity is not just about tools and technology. There is a human element, too, that companies can leverage in their favor in their cyber defense strategies year-round “ and particularly during the busy holiday season.
Log4j Vulnerability Security Bulletin
On Friday December 10, 2021, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert based on the Apache Software Foundation security advisory regarding a critical (CVSS score of 10 out of 10) remote code execution vulnerability affecting Log4j.
Wisconsin attack is a sad reminder that non-Covid threats persist

Organizations, families, law enforcement, security planners and defenders, and even individuals need to fight complacency, dust-off physical and mental playbooks, be aware, and remember how to detect, disrupt, and respond to the crudest of security threats.
Disclosure of cyber risks and incidents by public companies

FBI released an alert warning that ransomware actors are seeking to exploit significant financial transaction events
KASEYA INCIDENT SECURITY BULLETIN

Security bulletin addresses the Kaseya ransomware attack and offers recommendations for security officers.
JBS SA Ransomware Attack Security Bulletin
On Sunday, May 30th, JBS SA determined its information technology (IT) systems were compromised by a ransomware attack.
Security Bulletin: Cybersecurity Executive Order

On Wednesday, May 12, President Biden signed an extensive Executive Order (E.O.) on Improving the Nation™s Cybersecurity.
Security Bulletin: Colonial Pipeline Incident
On Saturday, May 8th, Colonial Pipeline confirmed that its information technology (IT) systems were compromised by a ransomware attack.
SolarWinds Compromise: Software Lifecycle Management Implications
The SolarWinds compromise, like other recent software lifecycle attacks, demonstrates the tradecraft and impact of successful software supply chain subversion.
Bulletin on Recent Ransomware and Extortion Attacks on Healthcare Organizations
The U.S. Cybersecurity & Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI) and Department of Health & Human Services (HHS) issued a joint alert October 28 that they had œcredible information of an œincreased and imminent cybercrime threat to U.S. hospitals and healthcare providers
A Rapidly Changing World Requires a New Approach to Supply Chain Security
For the last decade, the public and private sectors have faced increasing complications managing complex and dispersed international supply chains.
Together or Apart on Privacy
Last month the Court of Justice of the European Union (CJEU) issued one of the most significant decisions in the court™s history, invalidating Privacy Shield
Software Lifecycle Security: Increased Scrutiny Offers Opportunity for Differentiation
As software products grow more complex “ with increasing dependencies on a dizzying ecosystem of software libraries, tools and distribution mechanisms “ the risk of exploitation expands.
BULLETIN ON RECENT RANSOMWARE AND DISRUPTIVE ATTACKS
The first half of 2020 has yielded multiple significant developments on ransomware and related disruptive attacks “ including new targets and evolving tactics, techniques and procedures (TTPs).
NAVIGATING THE UNKNOWN: EXECUTING A SUCCESSFUL RETURN-TO-WORK AMIDST THE COVID-19 PANDEMIC
As the rate of new COVID-19 cases gradually stabilizes across a number of major metropolitan areas, companies are transitioning from risk avoidance to risk acceptance and contemplating how best to return their workforce to the office in a way that balances productivity and duty of care
THE DEATH OF QASSIM SULEIMANI AND RISKS TO GLOBAL SECURITY
On January 3, 2020, a U.S. drone strike near Baghdad airport killed Maj. Gen. Qassim Suleimani, one of Iran™s most powerful military commanders overseeing security and intelligence, and close confidant of Supreme Leader Ayatollah Ali Khamenei
APPLYING INTELLIGENCE TECHNIQUES TO THE CORPORATE WORLD
The use of local business partners is as old as global commerce itself. European merchants leveraged middle men across the ancient Silk Road…
RANSOMWARE: THE NEED TO ASSESS AND MITIGATE NOW
2019 continues to be a year filled with ransomware attacks. One of the key themes at DHS™ 2nd Annual National Cybersecurity Summit was the rapid…
5G CONVERSATIONS AT CISA’S NATIONAL CYBERSECURITY SUMMIT
Last week™s Second Annual National Cybersecurity Summit, hosted by the newly established Cyber and Infrastructure Security Agency (CISA), covered a…
PREPARING FOR THE UNEXPECTED: HOW BUSINESSES CAN TURN TRAGEDY IN TO ACTION
As several U.S. communities, and the Nation, continue to mourn the loss of innocent lives due to senseless and incomprehensible active shooter incidents…
SECURITY SERIES RECAP: TOP TAKEAWAYS AND TRENDS TO WATCH

The Chertoff Group hosted the Security Series Event œAI, Threat Intelligence, and The Cyber Arms Race which convened an exclusive group of thought leaders to discuss critical security issues facing the public and private sectors. Below are key take-aways from the event.
Check out the full panel to hear how experts are leveraging AI solutions to prevent, detect, and respond to adversaries attacking our critical infrastructure and the private sector.
BUILDING A RESILIENT DNS ECOSYSTEM REQUIRES GLOBAL COOPERATION
The Financial Times today published my point of view on why I believe we need increased international attention on advancing high cybersecurity standards…
THE NETWORK CRACKS APART
When the network of the internet and related systems was first imagined, those who built it had a rose-colored view of humanity. They created a cyber-world…
RSA 2019 RECAP: TOP TAKEAWAYS AND TRENDS TO WATCH
In early January, The Chertoff Group released a series of predictions around key cyber threat, policy, and market trends shaping the landscape in 2019. On the tails of the RSA conference, here are our thoughts on how those predictions are faring and highlights of important trends to watch…
THE KEY CYBER MARKET TRENDS THAT WILL DEFINE 2019
As the public becomes more security-conscious, these cyber market trends will dominate 2019.
THE MUST-KNOW CYBER POLICY TRENDS SHAPING 2019

Plan for these 2019 cyber policy trends to strengthen cybersecurity policies and practices.
THE TOP CYBERSECURITY THREATS TO ANTICIPATE IN 2019

Organizations should watch for these critical and growing cyber threats as they plan their cybersecurity measures for 2019.
THE REVISED CLOUD ACT IS AT THE FINISH LINE
Last night, House and Senate leaders released their draft Omnibus appropriations bill. The bill not only sets spending levels for the various Federal government agencies and departments, but also includes several important updates to the laws and policies governing lawful access to data. Among them is a revised version of The CLOUD Act, which includes changes designed to strengthen privacy protections and Congressional oversight made in response to concerns raised by civil liberties and privacy groups upon review of an earlier version of the bill.
NOW IS THE TIME TO ACT ON CLOUD
Earlier this week, two dozen civil liberties-focused organizations, including the American Civil Liberties Union (ACLU), Center for Democracy and Technology (CDT), and Amnesty International USA, wrote to members of Congress to express their opposition to The CLOUD Act.
GLOBAL ACCESS TO DATA: THE COMING REVOLUTION
œData is the new oil. Or so say the pundits. If it is, then we are about to experience the first great international data transformation, much as oil transformed transportation.
THE EVOLVING LANDSCAPE OF CYBERSECURITY LIABILITY
Sitting in a small group setting with cyber policy experts in Washington, D.C., I heard a well-respected cyber policy analyst say: œThe cyber security of the Internet of Things is a national security issue. It is long past time for the law to impose liability on those who write insecure code.
CHERTOFF GROUP ALERT: PETYA RANSOMWARE CAMPAIGN
The Chertoff Group continues to closely monitor the Petya ransomware attack. The story is still evolving, but we wanted to provide a brief summary for those of you who may not have had time to review in detail and assess appropriate actions for your organization.
INVESTING IN NUCLEAR ENERGY IS A U.S. NATIONAL SECURITY IMPERATIVE
Few policy makers in Washington would disagree that the United States benefits when we have a safe, secure, reliable energy supply. In fact, because our electric grid and power generation are vital to the United States economy, most support it. However, at this moment, I fear we are missing a critical opportunity when it comes to investing in our nation™s nuclear energy program.
CHERTOFF GROUP ALERT: WANNACRY RANSOMWARE CAMPAIGN
The Chertoff Group continues to closely monitor the WannaCry ransomware attack. The story is still evolving, but we wanted to provide a brief summary for those of you who may not have had time to review in detail and assess appropriate actions for your organization.
ADDRESSING CYBERSECURITY ACROSS THE HEALTHCARE INDUSTRY
Last week™s global ransomware cyber-attack that upended hospitals across the globe reminds us that every innovation comes with challenges. In all industries, especially the healthcare industry, connectivity offers tremendous benefits but also increased risk. Although these attacks disrupted healthcare services and others, the risk extends to every aspect of connected healthcare, including connected medical devices. This industry must come together to address growing challenges.
THE EQUITIES DECISION: DECIDING WHEN TO EXPLOIT OR DEFEND
The whole WannaCry episode has understandably resurrected the question of NSA’s role in identifying and then exploiting or patching cyber vulnerabilities.
OPINION: DATA LOCALIZATION IS MISGUIDED
Today we stand at a crossroads. Will the internet continue to be a global system for commerce, politics, and social discourse, or will that world-girding network fracture into component parts? The road we take will help to define the vitality of the cyber network for the foreseeable future.
OPINION: MICROSOFT WINS, GOOGLE LOSES, AND CONFUSION REIGNS ON LAWS SURROUNDING LAW ENFORCEMENT AND CLOUD COMPUTING
Over the past year, U.S. courts have grappled with important legal questions surrounding how U.S. law enforcement gains access to data stored in the cloud.
OPINION: COMMUNITY RESILIENCE: A SOLUTION TO THE HOMELAND SECURITY PARADOX
Terrorism in 2016 does not pose an existential threat to the United States. This is not to say that terrorism is not a significant security challenge, or a priority for the government, but the fact remains that Americans are far more likely to die in a car accident or from heart disease than in a terrorist attack.
WHAT WE ARE SEEING WITH RECENT DDOS ATTACKS AND IMMEDIATE MEASURES TO CONSIDER
A major distributed denial of service (DDoS) attack occurred last Friday, October 21, disrupting Internet communications throughout parts of the United States in several waves.
When a DDoS attack occurs, it leverages a large volume of compromised, or poorly configured devices, to flood a victim with unsolicited Internet traffic. The attack overwhelms the targeted system and results in degraded or discontinued service availability.
OPINION: TWO ROADS DIVERGED IN CYBERSPACE
Two roads diverge in cyberspace. In one direction lies a free and open internet, marked by the global flow of data and ideas. In the other, lies a fractured network balkanized along national or regional lines, with restricted flows and an authoritarian character. We must choose carefully which path to travel, lest we regret our decision in the future.
OPINION: PLANES, GUNS AND CRYPTO: AS QUANTUM COMPUTING CREEPS CLOSER, WE’RE FIGHTING THE WRONG BATTLE ON ENCRYPTION
In the early days of World War I, planes were initially used only for reconnaissance.
THE EUROPEAN COURT OF JUSTICE (ECJ) DECISION ON UNITED STATES – EUROPEAN UNION SAFE HARBOR FRAMEWORK: POLICY HIGHLIGHTS AND BUSINESS IMPLICATIONS
On October 6, 2015, The European Court of Justice (ECJ) delivered a judgement invalidating the U.S.-E.U. Safe Harbor framework.