Skip to player
Skip to main content
Search
Connect
Watch fullscreen
1
Bookmark
Share
More
Add to Playlist
Report
Cybersecurity criminals rarely face jail time, says former White House cybersecurity coordinator
Fortune
Follow
1 year ago
Former White House Cybersecurity Coordinator Michael Daniel offers insights into the evolving cyber threat landscape and discusses the current challenges businesses face with ransomware and cybersecurity policies.
Category
ð€
Tech
Transcript
Display full video transcript
00:00
Michael, I have to start, first of all, since we're talking about cyber security, you gave
00:06
me one little nugget there that you used to be a multi-level marketer of knives as a kid,
00:11
so I thought, you know, my vision of the kid in front of the terminal, the gamer who then
00:17
becomes the excellent cyber security expert, was that your trajectory?
00:21
No.
00:22
Okay, so give us a little bit of a sense of you before we get into your expertise.
00:26
Sure.
00:28
I mean, I will own up to my nerddom, right?
00:32
You're reaching for, okay, no, okay, I thought you were trying to pull out a knife.
00:41
But I will own up to the fact that I was quite the geek as a child, but I did not pursue
00:45
a computer science path.
00:48
My background is primarily in economics and finance, so I'm very at home in this space.
00:55
I spent most of my early part of my federal career doing budgeting and finance at the
01:00
Office of Management and Budget, and so I very much came into cyber from the resourcing
01:06
side of things, and come at and think about the issues that we deal with in cyber security
01:13
very much from a behavioral economics, from an incentive structure kind of lens.
01:21
Can you give us a couple of little nuggets from your time in the White House, because
01:24
most of us don't get to go into those rooms, and give us a few stories.
01:29
What are your favorite memories?
01:30
So I would say-
01:31
Or worst memories.
01:32
That might even be better.
01:33
There are some of those too, but I would say that, first of all, it's much smaller than
01:38
you think it is.
01:39
So like all of the pictures and the movies and things like that, the hallways are way
01:45
too wide.
01:46
The ceilings are way too tall.
01:47
Hollywood studios.
01:48
Yeah, most of the time it's nothing like that.
01:51
Even the Oval is not that big, relatively speaking, because it's an 18th century manor
01:58
house.
02:00
But I would say that some of the stories that we have from that time are really about how
02:07
do you actually talk about and think about and address cyber security in a way that normal
02:16
people can understand.
02:17
My first few meetings in the White House Situation Room, when we were dealing with
02:22
these issues, everybody was like this.
02:25
Remind people which administration.
02:27
So I was with ... Well, I actually worked for multiple administrations, and started
02:32
in the Clinton administration, served through the Bush administration, and the Obama administration.
02:37
I became Cyber Security Coordinator for President Obama.
02:41
And so in 2012 still, people would be like this in the sit room, because they're reading
02:46
their talking points, and they wouldn't actually look up and talk to anybody because they didn't
02:50
know what they were talking about at that point.
02:54
By the time we left in 2017, that was not the case anymore.
02:59
And when I first came into the White House, there was a debate about whether or not cyber
03:04
security was an issue that actually warranted inclusion in national security discussions.
03:13
That wasn't the case by the time we left.
03:16
You asked about some examples.
03:19
In 2012, the Iranian government started carrying out denial of service attacks against some
03:26
of our financial services companies.
03:27
From the Iranian point of view, this was equivalent response to the sanctions.
03:34
This was an equal response to the sanctions that were being put on them.
03:40
But there was a great debate in the White House about what this was.
03:45
There were some people who were like, okay, this is the equivalent of the Iranians sailing
03:50
a sub up to the coast of Maryland and disgorging a bunch of special operations guys and blowing
03:56
stuff up.
03:57
Wow.
03:58
And other people were like, no, that's not what this is.
04:01
It's a denial of service attack.
04:03
This is like they've hired a bunch of teenagers to drive up and down the street and play their
04:06
radios really loud.
04:09
That makes me wonder about state-sponsored hacking today now, radio versus the sub.
04:16
But the point was that people were struggling with how do I think about this problem?
04:22
What's my analogy?
04:24
How do I actually bring my own experience to this?
04:27
And that was the problem was that a lot of our previous experiences didn't translate
04:31
very well into the cybersecurity situations that we were facing.
04:35
You've stayed immersed in this world.
04:36
So let's go forward 12 years now to circa today.
04:42
Tell us a little bit about the threat landscape.
04:44
Obviously everybody in this room is aware of it.
04:47
You can't be a CFO, certainly a CISO, and not have that be top of mind.
04:52
We all know CrowdStrike's a whole different now.
04:54
Of course, your patch can be a problem too, but give us a sense of what you're seeing
04:59
and what you would put on our radars.
05:03
The CrowdStrike example is an example of what I referred to as evil cyber lord rule number
05:08
one when I was in the White House, which is never attribute exclusively to evil when stupid
05:13
is still available as an option.
05:15
And no apology.
05:16
It was crisis management one to one fail.
05:23
What I would say in terms of the threat landscape and what we're facing today, you really actually
05:28
have a couple of different strands, which is that you have a very thriving criminal
05:36
ecosystem that is making a lot of money, that has a couple of different basic flavors that
05:44
they use to make that money.
05:48
And that threat is continuing to become more intense because we keep making it easier to
05:55
be-
05:56
Just the ransomware?
05:57
Ransomware is a good example, business email compromise, right?
06:00
There's a few basic flavors that they use to do these kinds of scams.
06:06
And besides that, we're connecting more devices to the internet, so we're constantly making
06:14
the threat surface bigger.
06:17
And the criminals have figured out that this is a pretty good business model.
06:22
New America did a study a few years ago that showed that all things being equal, if you
06:27
commit a physical crime in the United States, your chances of being prosecuted and convicted
06:33
and spending time in jail is about 50%.
06:36
If you commit a cyber crime, your chances of being arrested, convicted, and spending
06:41
time in jail is 0.05%.
06:42
Wow.
06:43
There's your incentive system at work.
06:46
Absolutely.
06:47
It's a completely different cost-benefit analysis.
06:49
One of the things I notice when I talk to leaders is not existential angst, but that
06:55
trope that, well, if you've all been breached, you just don't know it yet, which almost in
07:01
a way is just like a, eh, I'll deal with it when it comes.
07:06
That does not seem to be a useful strategy in this environment where the stakes are high
07:12
and you can avert attacks, right?
07:15
Yeah.
07:16
I'm very frustrated with the approach of the assume breach approach.
07:22
It's not because it's not true.
07:23
In many ways, it's right, but in my view, it sends the wrong message.
07:28
It sends a very fatalistic message that there's nothing that you can do to address your cybersecurity.
07:36
That's just completely wrong.
07:38
There are, in fact, well-known, well-researched, well-supported practices that will meaningfully
07:46
reduce your cyber risk.
07:47
Now, will you ever be able to drive your cyber risk to zero?
07:51
No.
07:52
Any more than you can drive your natural disaster risk to zero, right?
07:56
But you can substantially lower it and you can make your company, your organization much
08:01
more resilient to cyber incidents.
08:04
You can transform this threat into something that you can manage over the long term.
08:10
Let me ask.
08:11
I want to get to some advice here, but I want to ask about the policy landscape given the
08:15
role you're currently in.
08:17
What should be on our radars right now with regard to what you're seeing in terms of policy,
08:23
what's needed in policy?
08:24
And let's, obviously, the US, but if there's anything on the global landscape as well,
08:28
because that always impacts how we act.
08:31
From a policy standpoint, there's really two broad efforts that we have to engage in.
08:39
One is, how do you actually make the ecosystem more resilient?
08:45
How do you raise the standards of care?
08:49
How do you establish the standards of care for cybersecurity?
08:52
How do you raise them so that we get to the level of cybersecurity that we want?
08:57
But also, how do we start baking cybersecurity in for the beginning?
09:01
How do we actually start doing secure by design?
09:05
Which means, how do you design software and hardware to actually be secure from the beginning,
09:10
rather than being like, oh, we've got this product, now we need to make it secure?
09:15
How do you actually build that in from the beginning?
09:17
How do you make it secure by default, so that when you pull the thing out of the box or
09:20
you deploy it on your network, it's secure to begin with?
09:24
There are actually many, many CISOs who would be familiar with something called hardening
09:29
guidelines, which is like, how do you actually take software and make it more secure?
09:35
My view is, we actually need loosening guidelines.
09:37
The software comes out of the box, already in its hardened state, and you really have
09:43
to loosen it up a little bit to make it work for you.
09:46
That's a much better place to be in.
09:51
Those things, how do we actually change the market so that you have secure by design be
09:59
the primary method by which software developers are working?
10:03
How do you incentivize secure by default?
10:06
How do you actually raise that level of cybersecurity across the ecosystem, make people more resilient?
10:13
Those are the resilience side policy questions.
10:17
Now, we're talking about the intersection of CISO, security officer, and then CFO.
10:24
The money question, one of the things that fascinates me is the whole question of culpability.
10:29
You've seen in the UK, for example, that they're going after the banks and saying, if you are
10:35
letting these bad actors use your accounts, you, in fact, are culpable.
10:40
Give me some sense of, and I know we want to turn this to a table conversation very
10:44
soon, but where you see that intersection, and especially with regard to what's happening
10:50
with the financial risk.
10:53
We mentioned, of course, ransomware.
10:55
We know about that.
10:56
We know that companies often don't like to talk about it for very good reasons.
11:01
I think what's happening on the policy front there and what's happening on the technology
11:05
front there is fascinating.
11:08
I think the question is, how do we establish the standards of care so that we know what
11:15
is the baseline that we're going to hold companies to?
11:18
Because I do think that companies bear a responsibility to protect their networks, protect their customers,
11:24
protect their data.
11:25
But at the same time, you also can't ignore the fact that we don't want to punish victims
11:33
that have done all of the right things.
11:36
The issue for us right now has been that we haven't been real clear about what all
11:39
the right things are.
11:42
As a policy matter, we need to get much more clear about, okay, if you've done these things,
11:47
then you're going to have safe harbor.
11:49
If you haven't done those things, now if you're a ...
11:53
Profitability.
11:54
Right.
11:55
My example is, if you're a, you store it, one of those you store it places, and you
12:01
say, please store your stuff with us because it's secure, but you don't have any fences,
12:06
you don't have any guards, you don't have any cameras, you don't have any alarm systems,
12:10
well then maybe somebody could actually say, no, actually, in fact, you're kind of liable
12:14
for some of that.
12:15
Yeah.
12:16
My dad's garage.
12:17
It doesn't count.
12:18
Yeah.
12:19
So sorry.
12:20
But if you've done all of those things, and you still were facing an incident, then no,
12:23
you probably shouldn't be held liable for that.
12:26
But we don't have those standards yet well established across a lot of the cybersecurity
12:31
areas.
12:32
I know we're going to turn this to a table conversation now, so I'm going to let you
12:36
have one last final thought.
12:38
It can be haiku length or just advice, and obviously we'll continue hearing from you
12:44
at the table, but any thoughts?
12:46
What advice would you have if you were in the role of the people at this table, CFO,
12:51
CISO, et cetera?
12:52
So I would say that cybersecurity is a business multiplier.
12:59
It is an investment that you make to make the rest of your business actually run.
13:04
And cybersecurity is one of those classic things that you can either pay me now, or
13:09
you can pay me later.
13:10
And I guarantee you that paying me later will be way more expensive.
13:13
Exactly.
13:14
Good advice.
13:15
Well, please join me in thanking Michael.
13:16
Obviously, continue the conversation.
Be the first to comment
Add your comment
Recommended
3:05
|
Up next
Mike Rounds Questions Top DoD Official About Using AI To Enhance Cybersecurity
Forbes Breaking News
8 months ago
0:46
Cybersecurity Spending To Increase After Meeting With Biden
Benzinga
4 years ago
5:22
Eric Swalwell Presses Cybersecurity Experts On Reforming US Cyber Security Clearance Process
Forbes Breaking News
7 months ago
6:03
âThe Future Of Warfare Is On The Cyber Battlefieldâ: Andy Ogles Urges Cybersecurity For Vulnerable Areas
Forbes Breaking News
8 months ago
35:58
Policing An Increasingly Complex Cyber World With Vaidyanathan R Iyer, COO at IBM Security
The Indian Express
3 years ago
5:34
Mike Rounds Asks DoD Nom About Evolving Threats From Cyber Artificial Intelligence And Space Domain
Forbes Breaking News
8 months ago
5:56
Andrew Garabino Asks Cybersecurity Experts Point Blank About CISA's 'Effectiveness' Amid Trump Layoffs
Forbes Breaking News
4 months ago
0:47
US Confronts Chinese Cyber-Espionage Threat: 'Worst Telecom Hack In Our Nation's History'
Benzinga
1 year ago
2:13
Throwing Money at Cyber Security Won't Solve the Problem
FORA TV
10 years ago
6:31
Why the Wealthy Are Hiring âCyber Bodyguardsâ
Fortune
2 months ago
4:11
Andrew Garabino Warns Zero-Day Hack 'Vulnerabilities Are Far From Being Eliminated'
Forbes Breaking News
4 months ago
2:35
Jacky Rosen Asks DoD Official About Adapting Training Pipeline To Deter Changing Cyber Threats
Forbes Breaking News
8 months ago
5:24
James Lankford Presses Trump Nominee On Protecting Infrastructure From Cyberattacks By Adversaries
Forbes Breaking News
7 months ago
0:32
Biden Issues Executive Order For Tough Cybersecurity Standards
Benzinga
11 months ago
4:08
Jacky Rosen Warns Of Cyber Threats From Foreign Adversaries Continuing To âIntensify Everydayâ
Forbes Breaking News
8 months ago
1:42
Firm falls victim to cyber attack after unwittingly hiring North Korean hacker
Bang Tech News
1 year ago
0:55
New cybersecurity roadmap seeks to protect PH from âcomplex cyber threatsâ â DICT
Manila Bulletin
3 years ago
20:05
How The Chief Security Officer Of CrowdStrike Approaches Cyberattacks
Forbes
2 years ago
5:25
LaMonica McIver Calls To Renew Congressional Funding For Cybersecurity Grants
Forbes Breaking News
4 months ago
0:15
Suspected cybercrime boss gets arrested and extradited
National World - Viral Videos
1 year ago
2:28
Air Vice-Marshal Darren Goldie appointed cybersecurity coordinator
ABC NEWS (Australia)
3 years ago
2:34
Companies to report ransomware attacks under new proposal
ABC NEWS (Australia)
1 year ago
0:54
Waymo Outage Update
Benzinga
9 hours ago
1:02
Cramer Slams Market 'Freakout'
Benzinga
9 hours ago
0:56
Trump's Fed Chair Stance
Benzinga
10 hours ago
Be the first to comment