Stay updated
Industry News, Thought Leadership, and Company News
Industry News

MC2 Security Fund leads $30 million Series C fundraising round for ThayerMahan
The Chertoff Group’s MC2 Security fund led a $30 million Series C round for ThayerMahan, a world leader in autonomous maritime surveillance solutions.

A Call to Action to Resource Our Nation’s Security
The DHS 2024 budget request from President Biden lacks proper resources to secure the nation given priorities including border security and cybersecurity.

Beyond Balloons: The Other Threats Posed by China, and What Can Be Done to Counter Them
Geopolitical expert Mira Ricardel and cyber expert Adam Isles discuss the threats posed by China and what can be done about them with the Epoch Times.

Former Deputy National Security Advisor Ricardel weighs in on Semiconductor Chip Production Strategy
Mira Ricardel tells Barrons, with U.S. export controls on Chinese semiconductor chips, the U.S. looks to allies to keep supply chains flowing.

A Call to Action to Resource Our Nation’s Security
The DHS 2024 budget request from President Biden lacks proper resources to secure the nation given priorities including border security and cybersecurity.

Beyond Balloons: The Other Threats Posed by China, and What Can Be Done to Counter Them
Geopolitical expert Mira Ricardel and cyber expert Adam Isles discuss the threats posed by China and what can be done about them with the Epoch Times.

Former Deputy National Security Advisor Ricardel weighs in on Semiconductor Chip Production Strategy
Mira Ricardel tells Barrons, with U.S. export controls on Chinese semiconductor chips, the U.S. looks to allies to keep supply chains flowing.
Thought Leadership

Secretary Chertoff discusses geopolitical risk with Elizabeth Vargas on NewsNation
EV: How do you advise clients who are doing business in China? MC: First, how do you protect your cyber assets and intellectual property? Second,

Secretary Chertoff Describes Working Under President Bush, Taking Down Enron and Building the Patriot Act on Eyewitness History Podcast
In an exclusive interview, Secretary Michael Chertoff, renowned security expert and co-founder of The Chertoff Group, spoke with Josh Cohen of the Eyewitness History podcast.

How data-centric security combined with zero-trust can solve our information sharing challenges
In this insight piece, published by SC Media, Michael Chertoff and Virtru CEO John Ackerly make the case for zero-trust and data-centric security (DCS) controls

CISA Secure Software Self-Attestation Common Form: Procurement and Regulatory Implications
On April 27, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a Request for Comment on the much-anticipated Secure Software Self-Attestation Common Form. Organizations that supply the U.S. Government with software products must prioritize software security efforts and compliance.

Point of View: 2023 National Cybersecurity Strategy
On March 2, the Biden Administration released a new National Cybersecurity Strategy.

Reflections on the Munich Security Conference and the First Anniversary of Russia’s War Against Ukraine
Former Homeland Security Secretary Michael Chertoff shares reflections on the Munich Security Conference and the first anniversary of the Russia-Ukraine war.

While Hive ransomware disruption is a win, many organizations remain unprepared
Top ransomware organization, Hive, was disrupted by global law enforcement. Ransomware paralyzes an organization by locking systems and files, rendering crucial data inaccessible.

Chertoff Group Leaders Share Insights on the 2022 National Defense Strategy
The NDS succeeds in framing the new global threat environment, and the resourcing, campaigning, and inter-departmental collaboration required to equip and support U.S. and allied forces.
Company News

Adam Isles in Harvard Business Review: Where to Focus Your Company’s Limited Cybersecurity Budget
Chertoff Group Principal and Head of Cybersecurity Strategic Advisory Services Adam Isles provides advice for organizations on how to build a cybersecurity program that defends against attacks. Determining how to measure a cyber performance baseline is the first step. Strong cybersecurity programs operate with a high degree of transparency, accuracy, and precision.