Stay updated
Industry News, Thought Leadership, and Company News
Industry News

MC2 Security Fund leads $30 million Series C fundraising round for ThayerMahan
The Chertoff Group’s MC2 Security fund led a $30 million Series C round for ThayerMahan, a world leader in autonomous maritime surveillance solutions.

A Call to Action to Resource Our Nation’s Security
The DHS 2024 budget request from President Biden lacks proper resources to secure the nation given priorities including border security and cybersecurity.

Beyond Balloons: The Other Threats Posed by China, and What Can Be Done to Counter Them
Geopolitical expert Mira Ricardel and cyber expert Adam Isles discuss the threats posed by China and what can be done about them with the Epoch Times.

Former Deputy National Security Advisor Ricardel weighs in on Semiconductor Chip Production Strategy
Mira Ricardel tells Barrons, with U.S. export controls on Chinese semiconductor chips, the U.S. looks to allies to keep supply chains flowing.

A Call to Action to Resource Our Nation’s Security
The DHS 2024 budget request from President Biden lacks proper resources to secure the nation given priorities including border security and cybersecurity.

Beyond Balloons: The Other Threats Posed by China, and What Can Be Done to Counter Them
Geopolitical expert Mira Ricardel and cyber expert Adam Isles discuss the threats posed by China and what can be done about them with the Epoch Times.

Former Deputy National Security Advisor Ricardel weighs in on Semiconductor Chip Production Strategy
Mira Ricardel tells Barrons, with U.S. export controls on Chinese semiconductor chips, the U.S. looks to allies to keep supply chains flowing.
Thought Leadership

Secretary Chertoff discusses geopolitical risk with Elizabeth Vargas on NewsNation
EV: How do you advise clients who are doing business in China? MC: First, how do you protect your cyber assets and intellectual property? Second,

Secretary Chertoff Describes Working Under President Bush, Taking Down Enron and Building the Patriot Act on Eyewitness History Podcast
In an exclusive interview, Secretary Michael Chertoff, renowned security expert and co-founder of The Chertoff Group, spoke with Josh Cohen of the Eyewitness History podcast.

How data-centric security combined with zero-trust can solve our information sharing challenges
In this insight piece, published by SC Media, Michael Chertoff and Virtru CEO John Ackerly make the case for zero-trust and data-centric security (DCS) controls

CISA Secure Software Self-Attestation Common Form: Procurement and Regulatory Implications
On April 27, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a Request for Comment on the much-anticipated Secure Software Self-Attestation Common Form. Organizations that supply the U.S. Government with software products must prioritize software security efforts and compliance.

Commercial Satellites at Risk in Russia-Ukraine Conflict
Putin has shifted the focus from the land war in Ukraine to space, stating that commercial satellites could be legitimate targets for retaliatory attacks.

New government directives and persistent threats reinforce urgency of securing software
Given the heightened cybersecurity threats and coming regulations, it™s important to reduce risk and achieve compliance with software best practices.

An Updated Privacy Shield at Last?
President Biden has put the U.S. on a path to restoring the Privacy Shield agreement.
-300x157.png)
Cyber Disclosure and Attestation: Recent Regulatory and Legislative Developments Heighten Expectations
Three recent notable regulatory and legislative developments are significantly heightening expectations on cybersecurity disclosures and attestations.
Company News

Adam Isles in Harvard Business Review: Where to Focus Your Company’s Limited Cybersecurity Budget
Chertoff Group Principal and Head of Cybersecurity Strategic Advisory Services Adam Isles provides advice for organizations on how to build a cybersecurity program that defends against attacks. Determining how to measure a cyber performance baseline is the first step. Strong cybersecurity programs operate with a high degree of transparency, accuracy, and precision.