Effective AI Oversight: Chertoff and Isles in Directors and Boards

As AI adoption accelerates, boards must rethink how they oversee technology risk. In a new piece published in Directors & Boards, Chertoff Group Executive Chairman Michael Chertoff and Head of Cybersecurity Adam Isles describe what effective AI security and safety oversight requires in a technology environment that is evolving in real time. The Core Message The […]

Golden Dome and the New Federal Buying Reality

Summary How Execution and Governance Are Reshaping Competition Our recent analysis of how agencies are making buying decisions in 2026 and beyond identified a clear shift: speed, portfolio governance and outcome-driven acquisition are now the defining forces in Federal procurement. Golden Dome puts that shift in concrete terms. More than a missile defense initiative, Golden […]

Coast Guard Investments Improve Readiness

The Chertoff Group‘s Aaron Roth writes in National Defense Magazine about the benefits of a well-funded U.S. Coast Guard. With $25 billion in new funding, Coast Guard investments will improve mission readiness, replace aging cutters and increase personnel. This will enhance performance in crucial areas including border security, drug enforcement, cybersecurity and disaster response. This […]

A Window Sticker for Software

How Buyers Can Use Performance Measures to Drive Better Security in Software Products Every modern organization relies on software and systems that it cannot create for itself. Whether that be small office automation software, larger enterprise applications, or hundreds of Internet-based services, the organization depends on that software to meet its business goals. The number […]

The Latest Cybersecurity Executive Order: Implications and Guidance

What happened On June 6, President Trump signed an Executive Order (EO) “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity.” The EO sustains efforts to strengthen the Cybersecurity and Infrastructure Security Agency’s (CISA) role in defending civilian Federal networks, bolsters protections against foreign cyber threats and advances secure technology practices in critical sectors. The EO also amends […]

Michael Chertoff on U.S. Tech Strategy and Priorities

On April 11, Chertoff Group Executive Chairman and Co-Founder Michael Chertoff delivered remarks on U.S. tech strategy and priorities amid growing competition from China at an event hosted by the New Lines Institute for Strategy and Policy. He touched on topics including technology innovation and artificial intelligence (AI), access to rare earth minerals for tech […]

Preparing for Sensitive Personal Data Security Requirements

On April 8, a U.S. Department of Justice (DOJ) rule took effect that restricts the handling of U.S. personally identifiable information (PII), where companies or their employees, vendors or investors have touchpoints in China, Russia and other countries of concern. Background and Key Provisions The Final Rule,  published in December 2024, applies to “covered data […]

How Can Directors Approach the Topic of AI?

AI

Chertoff Group Executive Chairman and Co-Founder Michael Chertoff participated in a conversation about the rapidly evolving topic of AI that took place at MLR Media’s 2024 Character of the Corporation conference late last year. The discussion also included Samantha Kappagoda, director and nominating chair, Credit Suisse Funds; Valerie Mosley, director, DraftKings. John Bremen, managing director, […]

How Will the Department of Government Efficiency (DOGE) Impact GovCon? 

Today, President Donald Trump was sworn in for a second, nonconsecutive term after the historic November 2024 election. As highlighted on the campaign trail, Trump’s Administration will bring with it an unprecedented challenge to the status quo of government operations, inviting important discussions about government size, efficiency and efficacy. Prior to taking office, Mr. Trump […]

Executive Protection: Ben Joelson Speaks with CNBC

Chertoff Group Principal and Head of Security Risk & Resilience Ben Joelson spoke with CNBC reporter Bertha Coombs about how corporate security leaders are reconsidering their priorities in the wake of the shooting of United Healthcare CEO Brian Thompson.

Salt Typhoon Amplifies Why End-to-End Encryption is Essential

Introduction Adam Isles and Andreas Kurland from our Cybersecurity team discuss the infiltrations of the Salt Typhoon security breach with the CISO Tradecraft podcast. As the U.S. government reveals that intrusions into telecom companies are deeper, more wide-spread and more severe than previously known, it is essential to incorporate end-to-end encryption into communication methods. What […]

Eliminating Foreign Influence in Federal Contracting 

In an age of amplified global tensions and heightened cybersecurity threats, the U.S. government has sharpened its focus on potential foreign influence in the federal contracting space. For contractors planning to acquire and maintain government business, understanding and preparing for this increased scrutiny is no longer optional—it’s a necessity.

Chad Sweet Speaks about Election Interference at Columbia

As the November presidential election approaches, American intelligence officials are warning of escalating foreign interference efforts by adversaries seeking to undermine trust in democratic institutions and influence U.S. politics.

Recent China-Based Cyber Attacks Highlight U.S. Tech Vulnerability

China’s aggressive operations to infiltrate the United States’ networks pose a significant security threat to the Nation’s critical infrastructure. China backed attacks, often referred to as Typhoon attacks, have focused on the US technology sector, targeting multiple layers of network infrastructure.  

Mapping the Cuckoo’s Egg

Using MITRE’s catalogued techniques, we can explain to a non-technical audience how these concepts apply today, demonstrating that foundational security principles from as far back as 1986 are still relevant.

Michael Chertoff Collaborates with EqualAI

AI

The increased integration of AI technology into our daily lives and operations raises pressing legal questions for lawyers, executives, policy makers and judges around how AI fits into our current legal frameworks. To help answer the call in preparing key stakeholders to address this critical concern, EqualAI collaborated with Chertoff Group Co-Founder and Executive Chairman […]

Chad Sweet Discusses 2024 Election Interference

In the modern world, the Internet and social media are domains of conflict. Our adversaries have used false information to attempt to manipulate us for many years. While it is nothing new, it is easier now in our high-tech world where nation states aim to undermine public confidence and exacerbate political polarization.

Memories of 9/11

As Americans, we give thanks for the freedoms we hold dear. Nearly 3,000 people were robbed of those freedoms 23 years ago. On this day we remember the lives lost and the lives forever changed on 9/11. From the remnants of that day a Mission was born. We pledged to never forget and to strive to never to allow such an egregious act of terror to happen again.

Ben Joelson appears on NewsNation to discuss Taylor Swift concert terror plot

Recent attacks in Europe are putting a spotlight on the sort of terrorism threats that U.S. officials have warned about. Most recently, two suspects, apparently inspired by the Islamic State group and al-Qaida, were arrested in connection to an apparent plot to attack Taylor Swift shows in Vienna, Austria. On August 8, Principal and Head […]

“Failure Is Not an Option:” How Contractors Can Develop Effective Capture Plans

In the summer of 1995, the film “Apollo 13” captivated audiences as a blockbuster hit, recounting the harrowing true story of a seemingly routine mission to the moon that turned into a life-or-death struggle when an oxygen tank exploded, crippling the spacecraft. The crew, led by astronaut Jim Lovell, had to rely on their ingenuity […]

Chertoff experts take to the airwaves in midst of CrowdStrike Outage

The CrowdStrike outage that crippled business operations on Friday July 19, including aviation and health care, highlights the need for organizations to safeguard the resiliency of critical systems. Chertoff Group cyber leaders including Michael Chertoff, Chad Sweet, Adam Isles, David London and Lee Kair provided commentary to networks including CNBC, CBS, FOX and NewsNation. As […]

Ben Joelson Discusses Assassination Attempt

Principal and Head of Security Risk and Resilience Ben Joelson, discusses the complexities of campaign security and executive protection, how detecting lone wolf attackers before they strike challenges security stakeholders, and the impact that the assassination attempt will likely have on campaign security moving forward.

Cyber is the New Battleground

Calling cyber the new battleground, Michael Chertoff said cybersecurity protection today is not about trying to build an impenetrable wall around your information technology infrastructure, but having layers of defense that enable you to mitigate problems when they arise.

Voice of the Customer: A Key To Unlocking Contracting Success

The Chertoff Group Federal Strategy team is passionate about sharing insights and best practices that drive success in the world of government contracting. Today, we’re diving into a topic that lies at the heart of our approach: the importance of listening to the voice of the customer.

Adam Isles comments to CNBC on Cyber Risks

CNBC’s Lori Ann LaRocco interviewed Adam Isles, Principal and Head of The Chertoff Group’s Cybersecurity Practice, about cyber concerns within critical infrastructure sectors including intrusions at water treatment facilities and risks to U.S. Ports.

Adam Isles Talks Water Plant Cyber Threats on CNBC

This morning, Adam Isles, Chertoff Group principal and head of Cybersecurity, joined host Becky Quick on CNBC’s Squawk Box to discuss the latest threats to U.S. water critical infrastructure. Earlier this week, the U.S. government warned of nation state cyber threats from Iran and China. According to White House National Security Advisor Jake Sullivan, “These […]

Is Cyber Enforcement the Right Approach to Reduce Risk?

Companies are being targeted by increasingly sophisticated cyber threats.. Good faith collaboration between government and the private sector is needed, write Michael Chertoff and David London in Homeland Security Today.

Aaron Roth speaks to Rigzone about Houthi Strikes in Red Sea

Aaron Roth, a principal and head of Federal Strategy at the Chertoff Group, told Rigzone the recent incident in the Gulf of Oman differs slightly from attacks in the Red Sea “given this vessel was involved in a previous dispute between the U.S. and Iran (sanctioned oil)”.

AI deep fakes threaten fair elections in 2024

In a January 11 Newsweek article by Michael Chertoff and former Danish Primer Minister and NATO Secretary General Anders Fogh Rasmussen explore the threat of deep fakes to fair elections.

Ambassador Ken Braithwaite appears on FOX and BBC

Ambassador Ken Braithwait

Chertoff Group Senior Advisor Ambassador Kenneth Braithwaite appeared on major news networks to discuss the U.S. Navy’s presence in the Eastern Mediterranean as a deterrent force in the region.

Michael Chertoff discusses the threat of Iranian Cyberattacks on U.S.

“I could envision the possibility — we have to be prepared for this — of an effort to attack our critical infrastructure or our electric grid, our, for example, air traffic system, water,” said Michael Chertoff, the former secretary of Homeland Security under the Bush administration.

Future of Democracy Discussion with Rice and Chertoff

Special Competitive Studies Project Future of Democracy Panel discussion featuring Michael Chertoff and Condoleezza Rice

Michael Chertoff, former Secretary of Homeland Security and co-founder and executive chairman of The Chertoff Group recently participated in a panel discussion on the Future of Democracy at the Global Emerging Technology Summit.

Michael Chertoff in Bloomberg Law: AI Needs Proactive Guardrails Across Industries

Bloomberg Law logo

Bloomberg Law recently published an op-ed by Chertoff Group Co-Founder and Executive Chairman Michael Chertoff on why the risks of AI must be addressed and guardrails established. Secretary Chertoff penned the article in his capacity as a special adviser on the American Bar Association Artificial Intelligence Task Force. “Because AI promises to transform virtually every […]

Michael Chertoff Weighs in on the Risks of Artificial Intelligence with News Nation

Michael Chertoff

Brook Shafer of News Nation covers a new report from the U.K. that shows artificial intelligence can steal passwords with 95% accuracy just by listening to keystrokes. Last week, tech leaders and senators met behind closed doors to discuss the risks of AI. Congress and the White House have been pressing tech companies to create […]

Michael Chertoff appears on In AI We Trust Podcast in his role as an advisor to the American Bar Association’s Task Force on Law and Artificial Intelligence

In this podcast, In AI We Trust, by EqualAI, Chertoff Group Co-Founder and Executive Chairman Michael Chertoff discusses the ways in which Artificial Intelligence is changing the legal landscape with co-panelist, Lucy Thompson, chair of the American Bar Association AI Task Force. The episode is co-hosted by EqualAI CEO Miriam Vogel and Karyn Temple, long-time […]

Outbound Investment Executive Order (14105)

Executive Order 14105 dramatically expands the Treasury Department’s purview to include U.S. private sector overseas investment in areas of national security concern, namely semiconductor and micro-electronics, quantum information technologies, and artificial intelligence.

SEC Publishes Public Company Cybersecurity Disclosure Final Rule

Chertoff Group logo

On July 26, the U.S. Securities & Exchange Commission (SEC) adopted its Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure. The final rule is a significant expansion of disclosure requirements for “material” cybersecurity incidents.

Podcast with our partner Virtru: Lessons Learned from the Microsoft Outlook Breach

In this podcast hosted by Virtru’s Rob Mc Donald, experts, including Chertoff Group’s David London and Michael Wilkes, discuss the Chinese hack on Microsoft’s cloud-based Outlook email systems. The breach resulted in unauthorized access to multiple Microsoft customer accounts, including government agencies. The attack raises concerns about relying solely on centralized cloud systems for cyber […]

Ukraine Bulletin-Update

This is an ongoing war-time situation and business entities need to make plans to mitigate the increased risk of operations in and around Ukraine, as well as prepare for widespread sanctions and potential Russian retaliation.

Ukraine Bulletin

The ongoing hostilities and cyberattacks in Ukraine are elevating risks not only to businesses and organizations in Ukraine, but to entities well beyond Ukraine™s borders. The Chertoff Group offers some suggestions on areas and issues to be mindful of in wake of the situation.

Ukraine Cyber Attack Bulletin

On Friday January 14, 2022, in the aftermath of unproductive diplomatic meetings between Russia and the U.S. and NATO, malicious cyber attackers launched a massive attack against Ukrainian government websites.

Log4j Vulnerability Security Bulletin

On Friday December 10, 2021, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert based on the Apache Software Foundation security advisory regarding a critical (CVSS score of 10 out of 10) remote code execution vulnerability affecting Log4j.

Bulletin on Recent Ransomware and Extortion Attacks on Healthcare Organizations

The U.S. Cybersecurity & Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI) and Department of Health & Human Services (HHS) issued a joint alert October 28 that they had œcredible information of an œincreased and imminent cybercrime threat to U.S. hospitals and healthcare providers

Together or Apart on Privacy

Last month the Court of Justice of the European Union (CJEU) issued one of the most significant decisions in the court™s history, invalidating Privacy Shield

THE DEATH OF QASSIM SULEIMANI AND RISKS TO GLOBAL SECURITY

On January 3, 2020, a U.S. drone strike near Baghdad airport killed Maj. Gen. Qassim Suleimani, one of Iran™s most powerful military commanders overseeing security and intelligence, and close confidant of Supreme Leader Ayatollah Ali Khamenei

SECURITY SERIES RECAP: TOP TAKEAWAYS AND TRENDS TO WATCH

The Chertoff Group hosted the Security Series Event œAI, Threat Intelligence, and The Cyber Arms Race which convened an exclusive group of thought leaders to discuss critical security issues facing the public and private sectors. Below are key take-aways from the event.

Check out the full panel to hear how experts are leveraging AI solutions to prevent, detect, and respond to adversaries attacking our critical infrastructure and the private sector.

THE NETWORK CRACKS APART

When the network of the internet and related systems was first imagined, those who built it had a rose-colored view of humanity. They created a cyber-world…

RSA 2019 RECAP: TOP TAKEAWAYS AND TRENDS TO WATCH

In early January, The Chertoff Group released a series of predictions around key cyber threat, policy, and market trends shaping the landscape in 2019. On the tails of the RSA conference, here are our thoughts on how those predictions are faring and highlights of important trends to watch…

THE REVISED CLOUD ACT IS AT THE FINISH LINE

Last night, House and Senate leaders released their draft Omnibus appropriations bill. The bill not only sets spending levels for the various Federal government agencies and departments, but also includes several important updates to the laws and policies governing lawful access to data. Among them is a revised version of The CLOUD Act, which includes changes designed to strengthen privacy protections and Congressional oversight made in response to concerns raised by civil liberties and privacy groups upon review of an earlier version of the bill.

NOW IS THE TIME TO ACT ON CLOUD

Earlier this week, two dozen civil liberties-focused organizations, including the American Civil Liberties Union (ACLU), Center for Democracy and Technology (CDT), and Amnesty International USA, wrote to members of Congress to express their opposition to The CLOUD Act.

GLOBAL ACCESS TO DATA: THE COMING REVOLUTION

œData is the new oil. Or so say the pundits. If it is, then we are about to experience the first great international data transformation, much as oil transformed transportation.

THE EVOLVING LANDSCAPE OF CYBERSECURITY LIABILITY

Sitting in a small group setting with cyber policy experts in Washington, D.C., I heard a well-respected cyber policy analyst say: œThe cyber security of the Internet of Things is a national security issue. It is long past time for the law to impose liability on those who write insecure code.

CHERTOFF GROUP ALERT: PETYA RANSOMWARE CAMPAIGN

The Chertoff Group continues to closely monitor the Petya ransomware attack. The story is still evolving, but we wanted to provide a brief summary for those of you who may not have had time to review in detail and assess appropriate actions for your organization.

INVESTING IN NUCLEAR ENERGY IS A U.S. NATIONAL SECURITY IMPERATIVE

Few policy makers in Washington would disagree that the United States benefits when we have a safe, secure, reliable energy supply. In fact, because our electric grid and power generation are vital to the United States economy, most support it. However, at this moment, I fear we are missing a critical opportunity when it comes to investing in our nation™s nuclear energy program.

CHERTOFF GROUP ALERT: WANNACRY RANSOMWARE CAMPAIGN

The Chertoff Group continues to closely monitor the WannaCry ransomware attack. The story is still evolving, but we wanted to provide a brief summary for those of you who may not have had time to review in detail and assess appropriate actions for your organization.

ADDRESSING CYBERSECURITY ACROSS THE HEALTHCARE INDUSTRY

Last week™s global ransomware cyber-attack that upended hospitals across the globe reminds us that every innovation comes with challenges. In all industries, especially the healthcare industry, connectivity offers tremendous benefits but also increased risk. Although these attacks disrupted healthcare services and others, the risk extends to every aspect of connected healthcare, including connected medical devices. This industry must come together to address growing challenges.

OPINION: DATA LOCALIZATION IS MISGUIDED

Today we stand at a crossroads. Will the internet continue to be a global system for commerce, politics, and social discourse, or will that world-girding network fracture into component parts? The road we take will help to define the vitality of the cyber network for the foreseeable future.

OPINION: COMMUNITY RESILIENCE: A SOLUTION TO THE HOMELAND SECURITY PARADOX

Terrorism in 2016 does not pose an existential threat to the United States. This is not to say that terrorism is not a significant security challenge, or a priority for the government, but the fact remains that Americans are far more likely to die in a car accident or from heart disease than in a terrorist attack.

WHAT WE ARE SEEING WITH RECENT DDOS ATTACKS AND IMMEDIATE MEASURES TO CONSIDER

A major distributed denial of service (DDoS) attack occurred last Friday, October 21, disrupting Internet communications throughout parts of the United States in several waves.
When a DDoS attack occurs, it leverages a large volume of compromised, or poorly configured devices, to flood a victim with unsolicited Internet traffic. The attack overwhelms the targeted system and results in degraded or discontinued service availability.

OPINION: TWO ROADS DIVERGED IN CYBERSPACE

Two roads diverge in cyberspace. In one direction lies a free and open internet, marked by the global flow of data and ideas. In the other, lies a fractured network balkanized along national or regional lines, with restricted flows and an authoritarian character. We must choose carefully which path to travel, lest we regret our decision in the future.

Our goal is to provide a solution tailored to your needs. Contact us today for a consultation. 

How can we help?

Fill out the information below. Provide as much detail and a team member will respond as soon as possible.