Up
Logo
Menu icon Menu icon
Menu
Call icon search icon search icon
Menu icon Menu icon
Logo Cancel
  • +1 212 694 7000 New York
  • +44 207 016 4250 London
  • +34 917 021 364 Madrid
  • +41 799 020 921 Geneva
  • +1 213 296 3300 Los Angeles
  • Home
  • Insights
  • Thought Leadership
  • The White House Summit on Cybersecurity: Key Takeaways

16 Feb 2015

The White House Summit on Cybersecurity: Key Takeaways

By Jeremy Kroll

It was an honor to attend The White House Summit on Cybersecurity and Consumer Protection held at Stanford University on 13 February 2015. I applaud President Obama’s efforts to bring together an impressive group of leaders across a broad range of industries, government and law enforcement officials, and consumer and privacy advocates to discuss cybersecurity. This is an issue that affects us all and clearly has no borders. While there were several core themes discussed throughout the day, three key takeaways are of particular interest to our industry and the clients we represent.

Public-Private Collaboration Is Critical

The overarching theme presented by the White House was how to boost the collaboration between companies and agencies in order to combat hackers. The announcement in the days preceding the summit of the new Cyber Threat Intelligence Integration Center (CTIIC) was just a first step. As a further validation of the importance and urgency on behalf of the White House surrounding the issue at hand, at the Summit President Obama signed an Executive Order directing the creation of Information Sharing and Analysis Organizations (ISAOs) which will enable companies and the government to share classified cyber threat information. Only with an ongoing sharing of threat information between the government, including the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI), and companies across industry groups, will we be successful. With much of the order voluntary, companies across all industries are also being asked to step up to the table now to not only share threat information but to establish best practices within their organizations in order to protect their constituencies in the future. This too is critical since the maintenance of best practices is closely tied to a company’s ability to get cyber insurance.

Understanding Your Vulnerabilities Is Key to Improving Best Practices

While the need to focus on the security systems operating behind consumer payment systems in order to make it harder for hackers to steal information is absolutely critical, and Apple CEO Tim Cook was quite persuasive on this point, to stop at payment systems alone would not solve cyber hacks. In order to enhance consumer protections online, single factor authentication, or the password, as the primary form of security is a dated practice that should be replaced with more secure technologies. Companies need also be mindful that criminals can breach a business’ defenses in any number of ways—directly through company networks and also indirectly through the network of vendors and third-party service providers. What is needed is a fuller understanding of all the possible threats, malicious actors, and the broad range of tactics those actors will employ. Across all industries, companies are facing a highly complex and constantly evolving threat environment with new attackers and attack methods to be wary of in order to protect their partners, clients, and customers.

What Comes Next Is Even More Meaningful

While it is essential for the United States to take a leadership role on this important issue, with guidelines and processes for internal consumption, we cannot merely look inward. We are living and working in an increasingly interconnected and globalized environment, and that environment also includes criminal elements. Cyber threats from foreign countries, such as Russia, China, and North Korea, keep growing. Sharing information alone won’t stop them. The next steps from our government in protecting our nation’s business must be even more meaningful. We urge cooperation with international law enforcement agencies to help protect companies from foreign-based threats and to help make significant progress in this area.

Is Your AML Program Up to the Task?

16 Mar 2018

16 Mar 2018

What Artificial Intelligence Can—and Can’t—Do to Help Fraud and Corruption Investigators Tackle Big Data

21 Feb 2018

21 Feb 2018

April 15 Isn’t Just Tax Day—It’s Also AML Certification Compliance Day

16 Feb 2018

16 Feb 2018

More Than Meets the Eye: Director Due Diligence in Today’s Corporate Activist World

12 Feb 2018

12 Feb 2018

  • Services
    • Our Practices
      • Investigations and Disputes
      • Regulatory Compliance
      • Cyber Defense
      • Construction and Real Estate
      • Strategic Risk and Security
      • Private Client Services
    • Our Approach
      • Multidisciplinary Teams
      • Investigative Experience
      • Global Reach
      • Technology
      • Working at K2 Intelligence
    • The K2 Difference
  • People
    • Professionals
    • Spotlight Profiles
  • Insights
    • Focus On
    • Videos
    • Thought Leadership
    • Resources
      • Glossary
      • Links
cyber attackcyber defensecyber due diligencecybersecuritycyber risk assessmentFBIdhs
  • About Us
  • Our Offices
  • Find a Professional
  • Sitemap

© 2018 K2 Intelligence, LLC | Privacy Policy | K2 Intelligence is not affiliated with Kroll Inc., Kroll Associates, Inc., Kroll On Track, Inc. or their affiliated businesses.

  • Twitter Twitter
  • LinkedIn LinkedIn
Clear text
loader
  • Services
    • Our Practices
      • Investigations and Disputes
      • Regulatory Compliance
      • Cyber Defense
      • Construction and Real Estate
      • Strategic Risk and Security
      • Private Client Services
    • Our Approach
      • Multidisciplinary Teams
      • Investigative Experience
      • Global Reach
      • Technology
      • Working at K2 Intelligence
    • The K2 Difference
      • A History of Success
      • Sizing Up a Situation
      • Finding the Needle in the Haystack
      • A Multidisciplinary Approach
      • Considering Every Angle
      • Securing the Right Outcome
  • People
    • Professionals
    • Spotlight Profiles
  • Insights
    • Focus On
      • Africa and Middle East
      • Art Risk Advisory: Art, Collectibles, and Wine
      • Cybersecurity Awareness
    • Videos
    • Thought Leadership
    • Resources
      • Glossary
      • Links
  • About Us
    • Our Story
    • Our Offices
    • Contact Us
    Careers
    • Working at K2 Intelligence
    • Job Opportunities
    Media
    • Appearances
    • Newsroom
    • Mentions
    • Media Contacts
    Events
    • Webinars
    • Speaking Engagements
    • Roundtables
    Contact Us