Joe Stuntz on cybersecurity and One World Identity

Cyber hygiene is still critical and the fundamentals still address many of the common issues.

Advertisements

Joe Stuntz was most recently the Policy Lead for the White House Office of Management and Budget (OMB) Cyber and National Security unit, now he works with One World Identity. We spoke with Stuntz about cybersecurity threats and solutions.

In October 2017, One World Identity, an independent strategy and research company focused on identity, named Joe Stuntz, as Vice President of Cybersecurity. Stuntz was recently served the Director of Program Performance for the White House Office of Management and Budget (OMB) Cyber and National Security unit. During his time at the White House, Stuntz helped develop the following cybersecurity initiatives: Executive Order 13800, The Cybersecurity National Action Plan (CNAP) and The Cybersecurity Strategy and Implementation Plan (CSIP). To find out what these initiatives were about, the on going threat of cyberattacks and the focus of One World Identity, we spoke with the technology expert.

Digital Journal How big is the cybersecurity risk facing developed economies?

Joe Stuntz: Because developed economies have connected more of their infrastructure and systems to the Internet, they are at a large risk of attack. In many cases what allows the economies to make progress and grow through the use of new technology and people connecting is also increasing their risk. Because connectedness is only going to increase with the introduction and adoption of smart devices known as the Internet of things, the risk will also increase.

DJ: Which types of risks do you think are the most significant?Stuntz: Outside of the very very unlikely catastrophic cyber attack that has physical impacts and causes loss of life, the risks I worry about are to the financial sector. If trust, confidence, and safety in the markets disappear, an economy could collapse and because of the interconnectedness of economies today it would be a global crisis. Also it is important to think about the definition of cyber security risk and think beyond the typical image of a hacker in a hoodie in a dark basement with a glowing keyboard. This risk includes lots of data stewardship issues where companies or countries use data to target fraud or misinformation. The advances in technology have made new types of commerce possible, but are also being used to create instability. Cyber hygiene is still critical and the fundamentals still address many of the common issues, but it should be part of a larger trust and safety strategy around managing data.

DJ: Are these risks greater from different countries?Stuntz: Each country has a different level of maturity in terms of cybersecurity, and a different number and type of threats. As mentioned above, some countries are not as technologically advanced which may be limiting their economy, but also reduces their cyber risk. Cyber attacks can also come as a reaction to international relations, political positions, or non-cyber attacks or sanctions. The focus should be for countries to understand the broader context and see cyber as a tool that a country or actor can use to accomplish broader goals.

For continue this http://snip.ly/ixn7f

Author: compliance4all

Compliance4All, the ultimate continuing professional education provider offers you regulatory and compliance trainings from the industry's leading experts, but with one crucial difference -the cost. Compliance4All's objective is to be a platform that provides regulatory and compliance trainings with all the class and features that come with these trainings, at a lower price. Compliance4All seeks to make regulatory and compliance trainings low-hanging fruits. Industries We Focus On: • Trade & Logistics • Aerospace Defense • Banking & Insurance • Food & Beverages • Auditing/Accounting & Tax • Energy • Environment • Education • Automotive Transport • Science and Technology • Government • Construction • Electronics & Semiconductor • Operation • Engineering/Science • Purchasing & Vendor Relation • General counsel/Accountant • Geology & Mining • Documentation/Records

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s