Speech and book reviews, expert interviews and news you can use on cyber-security, U.S. national security and global security matters from Lisa Bernard, President of Lisa Bernard's SecuritySpeak, LLC - a private consulting firm and speakers bureau.
Showing posts with label public speakers. Show all posts
Showing posts with label public speakers. Show all posts
Like many of you, I am deluged today by memories of September 11, 2001. All my telephones ringing at once. Neighborhood schools on lockdown. Huddling on the couch with my family as we watched hours of mind-blowing and life-altering events unfold on television. On television. 9/11 happened before the advent and ubiquity of social media. It was pre-Facebook, pre-Twitter, pre-Instagram.
Today, emergencies, crises and disasters - manmade or natural - occur with a panoply of media available to interlopers and bystanders. Without a plan for media management and rules set forth by an organization's leadership well in advance, social media may interfere with or complicate life-saving efforts. I share the wisdom of Bo Mitchell, President of 911 Consulting:
911 Consulting is the nation's leader in emergency planning and training for workplaces. Founder and President Bo Mitchell, CEM, CPP, CBCP, CAS, CSI-ML, HSEEP, MOAB, CHCM, CHSP, CHS-V, CSSM, CSHM, CFC, CIPS, CSC, CESCO, IAC, TFCT3, CERT, CMC, CHEP, served as Police Commissioner of Wilton, Connecticut for sixteen years. He retired in 2001 to establish 911 Consulting with the mission to protect people at their workplaces during emergencies.
On the heels of the terrorist attack in London and the excellent piece, Think Before You Tweet in the Wake of an Attack at www.Wired.com, the words of Bo Mitchell, President of 911 Consulting and Former Police Commissioner in Wilton, Connecticut, are echoing in my head. If you manage a facility, department or business, or if you work or recreate in one, his counsel will resonate with you and may well help you save your own life and the lives of others in an active shooter scenario, terrorist attack or natural disaster. Here is an excerpt of my recent interview with him:
I admit, my first reaction to the news of a break in forty years of American policy was as much to the time span of forty years as to the event itself. Could this be the beginning of a shift of Biblical proportions? Hmmm ... I next analogized the happening to a superpower chess match. While our eyes have been on North Korea as a pawn of China and Russia, could the United States have just moved it's Queen on China's Bishop? Enough. It was time to call an expert, so I reached out to Gordon G. Chang, author of The Coming Collapse of China and devoted analyst of Asian security matters. He has been generous and pivotal in this space and, most recently, speaking to a live audience at our Election Night 2016 Security Summit. He replied with his characteristic precision and alacrity:
"It is possible the phone conversation Friday with Tsai Ing-wen was Trump's opening bid in a complex bargaining with Beijing and that he has no long-term intention to strengthen relations with Taipei, but the Trump advisor who put the call together, Stephen Yates, is a strong proponent of Taiwan. It is almost certain, therefore, that Yates was trying to steer American policy in Taipei's direction.
What we do know is that the President-elect has broken with almost four decades of Washington policy toward China, and this creates a dynamic that could take on a life of it's own.
My followers began asking for clarity from an expert on the relationship between China and North Korea's nuclear program. I asked Gordon Chang, author of Nuclear Showdown: North Korea Takes on the World, and internationally respected pundit on security matters in Asia, about this.
With his comprehensive approach and gracious style, Gordon Chang is renowned for his incisive analyses and commentary. He lived and worked in Shanghai as Counsel to the American law firm Paul Weiss, and earlier in Hong Kong as Partner in the international law firm Baker & McKenzie. He has briefed the United States CIA, Pentagon and State Department on security developments and he shared this assessment with me this week:
"North Korea has three launchers--theTaepodong-2, the KN-08, and KN-14--that can hit the lower 48 states. The better view is that the North cannot mate a nuclear warhead to them, but that is only a matter of about three years. The North Koreans have already put a nuke on top of their intermediate-range Nodong.
Beijing could rein in North Korea, but Chinese leaders do not want to do so because they view America as their main strategic rival. They find Kim Jong Un's antics useful in keeping us and our allies off balance.
We could force Beijing into being helpful--by, for example, imposing secondary sanctions on Chinese banks and enterprises--but so far there have been only tentative moves to do so. The U.S. sanctions on Dandong Hongxiang industrial, imposed last month, show attitudes in the American capital are changing. They are changing because an unstable Kim Jong Un in control of the world's most destructive weapons is presenting American policymakers with little choice."
N.B. Gordon Chang will be presenting The New Nuclear Politics: China, Iran and North Korea, at the Election Night 2016 Security Summit, 80 Minutes Around the World: Security Briefings for the Next American President, in Westport, CT, on November 8th.
I asked Dr. Austin Long, authority on international security matters and particularly urban operations in counterinsurgency, to put this in perspective for us. He replied: "The
long awaited offensive to retake Mosul is a welcome sign of progress in the war
on the Islamic State but should not be heralded as the beginning of the end.
The loss of Mosul will hurt the group but not fatally. We should always
remember that retaking Fallujah in 2004 was seen as a major sign of progress
but two years later Al Qaeda in Iraq, the Islamic State's predecessor, was
stronger than ever."
Hear Dr. Long on Monday, November 7, 2016, at 7:00 p.m. at Sacred Heart University in Fairfield, CT. He delivers, The Islamic State in Iraq and Syria: Crucible for the Next American President. For details: LisaBernard@SecuritySpeak.net or www.Facebook.com/PodiumTime.
I arrived in
Arlington, Virginia, at News Channel 8 Studios to meet Robert "Bob" Bigman before he
went on the air as Francis Rose’s guest on Government
Matters.From the get-go, I sensed
the “quiet celebrity” he enjoys among those in-the-know in Washington, D.C.He is the man who served for thirty years at
the Central Intelligence Agency – most of the latter years as Chief
Information Security Officer (CISO).Simply
put, he kept the CIA’s data secure.Now, at a time when most Americans – private citizens
and public officials – feel the threat or pain of being hacked, Bob's
insights seem particularly pertinent and his achievements especially notable.I was delighted that this down-to-earth professional – who
for so long was under the radar – was graciously coming into the
spotlight to share his sense of this with us. What he conveyed was as inspiring as it was stirring.His cheerful manner and serene demeanor bespoke
a guarded “could-be-done” attitude about recovering the upper hand in the cyber security challenges we face – “guarded”
being the operative word.My takeaway
was that we Americans can combat these
threats provided 1) our resolve comes with calm, candor and clarity about
the nature of the technologies and the humans who engage them and 2) that we
have devoted leadership at the organizational and national levels.
LISA BERNARD: On one thing all cyber-security experts agree: human behavior and psychology loom large as key factors. We are a nation of e-consumers, wed to convenience and beginning to integrate into the job force a generation raised on the efficiency of their smart phones. Bob, what will it take - new technology or a crisis - to shift the pendulum from user-myopia to individual vigilance?
LISA BERNARD: We are electing ourselves a new Commander-in-Chief next month and although it is now common knowledge that the software we use is outdated - even in our nuclear missile systems - we hear little about this from the candidates. Just how outdated is government software and why are antiquated systems still in use?
LISA BERNARD: Many of my followers are CISOs themselves or CEOs who rely on them. With the proliferation of mobile devices and the trend toward super-computing what advice can you give them?
LISA BERNARD: If our next POTUS appointed you "Tsar of Cyber Security," with all the resources you would need to set our nation on a modern and safe course, what would be your first priority?
LISA BERNARD: Since leaving government service, as a consultant,you have been moving the dial, persuading firms to move toward more managed and isolated networks. In the private sector, where the internet is like oxygen, how are you doing this?
ROBERT BIGMAN: The really bad news is that even if you wanted to stay disconnected, increasingly, technology and the evolution of your world will connect you. The marketplace has already determined that you're going to stay connected to the internet. So what can you do? Start with your biggest risk - which is how you and your devices - computers, mobile devices, smart phones - how they actually connect to the internet. Know that to ameliorate this risk, you just can't simply any longer rely on commercial capabilities like firewalls, modems and router protection and control lists. There's a collection of simple things you can do. First, I recommend that you NOT use commercial applications like Windows or Adobe. Instead use alternative operating systems like Ubuntu and Opera as a browser.
LISA BERNARD: What products are now available to make this "shift" possible and attractive in a culture that is hyper-connected?
ROBERT BIGMAN:There are
probably very few products that I would recommend where you can say that if you
buy this product that you can secure your data completely and your don’t have
to worry any more.In fact, there are no
products like that despite what vendors will tell you.What I
find is the biggest problem is that organizations simply don’t understand the
risks to their systems, their networks, and their data and they too often – as
a result of attending the RSA conference, the Black Hat conference, the DefCon
conference – they too often fall into the trap of using technology to solve
very complex problems that require people issues, process issues, policy issues
and yes, some technology issues.But trying
to address them with just technology is the number one mistake. And I know the vendors don’t want you to hear
that message, but the fact is that unless you have a cyber-security program and that you have as the component
parts of governance, IT management, public policies and processes, no matter
how much technology you buy, you’ll still get beat.And every event, every incident I’ve been
involved where we’ve investigated – unauthorized access, penetration, hacking,
unauthorized use of data – all involve the process and policy issues violations
as ever as they involve misuse or improper technology.
###
Bob Bigman is available for briefings, talks and workshops via Lisa Bernard's SecuritySpeak, LLC. See his bio at www.SecuritySpeak.net. To discuss the particulars of hosting him, phone (203) 293-4741 or email LisaBernard@SecuritySpeak.net.
Do you run a small to mid-sized firm, non-profit or
department not yet as focused on cyber security as you need to be? You’re
not alone. And, help is available. I’ve been sharing with
clients word of the impressive Confidential Cyber Risk Assessment (CCRA) being
offered by Marc Groz ‘s firm Right Risk, LLC, and realized how many of my
readers here might benefit from exploring this as well. Marc
is an authority on risk and financial markets, with a special focus on cyber
and systemic risks. He brings a unique experience profile to Right Risk,
having served in senior risk, technology, and research roles for well-known
hedge funds and a multi-billion-dollar asset manager. I welcomed
Marc to my interview seat to get a better sense of Right Risk’s cyber risk
assessment for managers like you. The following are excerpts from our
talk. BERNARD: Welcome back to Security Briefs, Marc. In
your promotional material you mention “the experts” at Right Risk involved in
your CCRA offer. Who are these experts and what do they deliver
specifically?
BERNARD: You have a powerful team at Right Risk and
this is a sophisticated assessment, Marc. Practically speaking, how
does it work? It sounds like a team of cyber-warriors will descend on the
office in Ghost-busters gear and start frantically scanning all the computers
and tablets. Please clarify this for us.
BERNARD: If my readers want to take advantage of this
offer, how do they get started?
BERNARD: Thank you, Marc. I know you’re
speaking today on cybersecurity in salon format at LaunchTalk so I
especially appreciate your time. To
learn more about Marc Groz and his availability for briefings
and presentations see his biographical profile at www.SecuritySpeak.net or email
LisaBernard@SecuritySpeak.net.