Skip to player
Skip to main content
Skip to footer
Search
Connect
Watch fullscreen
Like
Comments
Bookmark
Share
Add to Playlist
Report
Cybersecurity criminals rarely face jail time, says former White House cybersecurity coordinator
Fortune
Follow
10/1/2024
Former White House Cybersecurity Coordinator Michael Daniel offers insights into the evolving cyber threat landscape and discusses the current challenges businesses face with ransomware and cybersecurity policies.
Category
🤖
Tech
Transcript
Display full video transcript
00:00
Michael, I have to start, first of all, since we're talking about cyber security, you gave
00:06
me one little nugget there that you used to be a multi-level marketer of knives as a kid,
00:11
so I thought, you know, my vision of the kid in front of the terminal, the gamer who then
00:17
becomes the excellent cyber security expert, was that your trajectory?
00:21
No.
00:22
Okay, so give us a little bit of a sense of you before we get into your expertise.
00:26
Sure.
00:28
I mean, I will own up to my nerddom, right?
00:32
You're reaching for, okay, no, okay, I thought you were trying to pull out a knife.
00:41
But I will own up to the fact that I was quite the geek as a child, but I did not pursue
00:45
a computer science path.
00:48
My background is primarily in economics and finance, so I'm very at home in this space.
00:55
I spent most of my early part of my federal career doing budgeting and finance at the
01:00
Office of Management and Budget, and so I very much came into cyber from the resourcing
01:06
side of things, and come at and think about the issues that we deal with in cyber security
01:13
very much from a behavioral economics, from an incentive structure kind of lens.
01:21
Can you give us a couple of little nuggets from your time in the White House, because
01:24
most of us don't get to go into those rooms, and give us a few stories.
01:29
What are your favorite memories?
01:30
So I would say-
01:31
Or worst memories.
01:32
That might even be better.
01:33
There are some of those too, but I would say that, first of all, it's much smaller than
01:38
you think it is.
01:39
So like all of the pictures and the movies and things like that, the hallways are way
01:45
too wide.
01:46
The ceilings are way too tall.
01:47
Hollywood studios.
01:48
Yeah, most of the time it's nothing like that.
01:51
Even the Oval is not that big, relatively speaking, because it's an 18th century manor
01:58
house.
02:00
But I would say that some of the stories that we have from that time are really about how
02:07
do you actually talk about and think about and address cyber security in a way that normal
02:16
people can understand.
02:17
My first few meetings in the White House Situation Room, when we were dealing with
02:22
these issues, everybody was like this.
02:25
Remind people which administration.
02:27
So I was with ... Well, I actually worked for multiple administrations, and started
02:32
in the Clinton administration, served through the Bush administration, and the Obama administration.
02:37
I became Cyber Security Coordinator for President Obama.
02:41
And so in 2012 still, people would be like this in the sit room, because they're reading
02:46
their talking points, and they wouldn't actually look up and talk to anybody because they didn't
02:50
know what they were talking about at that point.
02:54
By the time we left in 2017, that was not the case anymore.
02:59
And when I first came into the White House, there was a debate about whether or not cyber
03:04
security was an issue that actually warranted inclusion in national security discussions.
03:13
That wasn't the case by the time we left.
03:16
You asked about some examples.
03:19
In 2012, the Iranian government started carrying out denial of service attacks against some
03:26
of our financial services companies.
03:27
From the Iranian point of view, this was equivalent response to the sanctions.
03:34
This was an equal response to the sanctions that were being put on them.
03:40
But there was a great debate in the White House about what this was.
03:45
There were some people who were like, okay, this is the equivalent of the Iranians sailing
03:50
a sub up to the coast of Maryland and disgorging a bunch of special operations guys and blowing
03:56
stuff up.
03:57
Wow.
03:58
And other people were like, no, that's not what this is.
04:01
It's a denial of service attack.
04:03
This is like they've hired a bunch of teenagers to drive up and down the street and play their
04:06
radios really loud.
04:09
That makes me wonder about state-sponsored hacking today now, radio versus the sub.
04:16
But the point was that people were struggling with how do I think about this problem?
04:22
What's my analogy?
04:24
How do I actually bring my own experience to this?
04:27
And that was the problem was that a lot of our previous experiences didn't translate
04:31
very well into the cybersecurity situations that we were facing.
04:35
You've stayed immersed in this world.
04:36
So let's go forward 12 years now to circa today.
04:42
Tell us a little bit about the threat landscape.
04:44
Obviously everybody in this room is aware of it.
04:47
You can't be a CFO, certainly a CISO, and not have that be top of mind.
04:52
We all know CrowdStrike's a whole different now.
04:54
Of course, your patch can be a problem too, but give us a sense of what you're seeing
04:59
and what you would put on our radars.
05:03
The CrowdStrike example is an example of what I referred to as evil cyber lord rule number
05:08
one when I was in the White House, which is never attribute exclusively to evil when stupid
05:13
is still available as an option.
05:15
And no apology.
05:16
It was crisis management one to one fail.
05:23
What I would say in terms of the threat landscape and what we're facing today, you really actually
05:28
have a couple of different strands, which is that you have a very thriving criminal
05:36
ecosystem that is making a lot of money, that has a couple of different basic flavors that
05:44
they use to make that money.
05:48
And that threat is continuing to become more intense because we keep making it easier to
05:55
be-
05:56
Just the ransomware?
05:57
Ransomware is a good example, business email compromise, right?
06:00
There's a few basic flavors that they use to do these kinds of scams.
06:06
And besides that, we're connecting more devices to the internet, so we're constantly making
06:14
the threat surface bigger.
06:17
And the criminals have figured out that this is a pretty good business model.
06:22
New America did a study a few years ago that showed that all things being equal, if you
06:27
commit a physical crime in the United States, your chances of being prosecuted and convicted
06:33
and spending time in jail is about 50%.
06:36
If you commit a cyber crime, your chances of being arrested, convicted, and spending
06:41
time in jail is 0.05%.
06:42
Wow.
06:43
There's your incentive system at work.
06:46
Absolutely.
06:47
It's a completely different cost-benefit analysis.
06:49
One of the things I notice when I talk to leaders is not existential angst, but that
06:55
trope that, well, if you've all been breached, you just don't know it yet, which almost in
07:01
a way is just like a, eh, I'll deal with it when it comes.
07:06
That does not seem to be a useful strategy in this environment where the stakes are high
07:12
and you can avert attacks, right?
07:15
Yeah.
07:16
I'm very frustrated with the approach of the assume breach approach.
07:22
It's not because it's not true.
07:23
In many ways, it's right, but in my view, it sends the wrong message.
07:28
It sends a very fatalistic message that there's nothing that you can do to address your cybersecurity.
07:36
That's just completely wrong.
07:38
There are, in fact, well-known, well-researched, well-supported practices that will meaningfully
07:46
reduce your cyber risk.
07:47
Now, will you ever be able to drive your cyber risk to zero?
07:51
No.
07:52
Any more than you can drive your natural disaster risk to zero, right?
07:56
But you can substantially lower it and you can make your company, your organization much
08:01
more resilient to cyber incidents.
08:04
You can transform this threat into something that you can manage over the long term.
08:10
Let me ask.
08:11
I want to get to some advice here, but I want to ask about the policy landscape given the
08:15
role you're currently in.
08:17
What should be on our radars right now with regard to what you're seeing in terms of policy,
08:23
what's needed in policy?
08:24
And let's, obviously, the US, but if there's anything on the global landscape as well,
08:28
because that always impacts how we act.
08:31
From a policy standpoint, there's really two broad efforts that we have to engage in.
08:39
One is, how do you actually make the ecosystem more resilient?
08:45
How do you raise the standards of care?
08:49
How do you establish the standards of care for cybersecurity?
08:52
How do you raise them so that we get to the level of cybersecurity that we want?
08:57
But also, how do we start baking cybersecurity in for the beginning?
09:01
How do we actually start doing secure by design?
09:05
Which means, how do you design software and hardware to actually be secure from the beginning,
09:10
rather than being like, oh, we've got this product, now we need to make it secure?
09:15
How do you actually build that in from the beginning?
09:17
How do you make it secure by default, so that when you pull the thing out of the box or
09:20
you deploy it on your network, it's secure to begin with?
09:24
There are actually many, many CISOs who would be familiar with something called hardening
09:29
guidelines, which is like, how do you actually take software and make it more secure?
09:35
My view is, we actually need loosening guidelines.
09:37
The software comes out of the box, already in its hardened state, and you really have
09:43
to loosen it up a little bit to make it work for you.
09:46
That's a much better place to be in.
09:51
Those things, how do we actually change the market so that you have secure by design be
09:59
the primary method by which software developers are working?
10:03
How do you incentivize secure by default?
10:06
How do you actually raise that level of cybersecurity across the ecosystem, make people more resilient?
10:13
Those are the resilience side policy questions.
10:17
Now, we're talking about the intersection of CISO, security officer, and then CFO.
10:24
The money question, one of the things that fascinates me is the whole question of culpability.
10:29
You've seen in the UK, for example, that they're going after the banks and saying, if you are
10:35
letting these bad actors use your accounts, you, in fact, are culpable.
10:40
Give me some sense of, and I know we want to turn this to a table conversation very
10:44
soon, but where you see that intersection, and especially with regard to what's happening
10:50
with the financial risk.
10:53
We mentioned, of course, ransomware.
10:55
We know about that.
10:56
We know that companies often don't like to talk about it for very good reasons.
11:01
I think what's happening on the policy front there and what's happening on the technology
11:05
front there is fascinating.
11:08
I think the question is, how do we establish the standards of care so that we know what
11:15
is the baseline that we're going to hold companies to?
11:18
Because I do think that companies bear a responsibility to protect their networks, protect their customers,
11:24
protect their data.
11:25
But at the same time, you also can't ignore the fact that we don't want to punish victims
11:33
that have done all of the right things.
11:36
The issue for us right now has been that we haven't been real clear about what all
11:39
the right things are.
11:42
As a policy matter, we need to get much more clear about, okay, if you've done these things,
11:47
then you're going to have safe harbor.
11:49
If you haven't done those things, now if you're a ...
11:53
Profitability.
11:54
Right.
11:55
My example is, if you're a, you store it, one of those you store it places, and you
12:01
say, please store your stuff with us because it's secure, but you don't have any fences,
12:06
you don't have any guards, you don't have any cameras, you don't have any alarm systems,
12:10
well then maybe somebody could actually say, no, actually, in fact, you're kind of liable
12:14
for some of that.
12:15
Yeah.
12:16
My dad's garage.
12:17
It doesn't count.
12:18
Yeah.
12:19
So sorry.
12:20
But if you've done all of those things, and you still were facing an incident, then no,
12:23
you probably shouldn't be held liable for that.
12:26
But we don't have those standards yet well established across a lot of the cybersecurity
12:31
areas.
12:32
I know we're going to turn this to a table conversation now, so I'm going to let you
12:36
have one last final thought.
12:38
It can be haiku length or just advice, and obviously we'll continue hearing from you
12:44
at the table, but any thoughts?
12:46
What advice would you have if you were in the role of the people at this table, CFO,
12:51
CISO, et cetera?
12:52
So I would say that cybersecurity is a business multiplier.
12:59
It is an investment that you make to make the rest of your business actually run.
13:04
And cybersecurity is one of those classic things that you can either pay me now, or
13:09
you can pay me later.
13:10
And I guarantee you that paying me later will be way more expensive.
13:13
Exactly.
13:14
Good advice.
13:15
Well, please join me in thanking Michael.
13:16
Obviously, continue the conversation.
Recommended
3:05
|
Up next
Mike Rounds Questions Top DoD Official About Using AI To Enhance Cybersecurity
Forbes Breaking News
4/15/2025
0:46
Cybersecurity Spending To Increase After Meeting With Biden
Benzinga
9/1/2021
5:22
Eric Swalwell Presses Cybersecurity Experts On Reforming US Cyber Security Clearance Process
Forbes Breaking News
5/28/2025
6:03
‘The Future Of Warfare Is On The Cyber Battlefield’: Andy Ogles Urges Cybersecurity For Vulnerable Areas
Forbes Breaking News
4/24/2025
35:58
Policing An Increasingly Complex Cyber World With Vaidyanathan R Iyer, COO at IBM Security
The Indian Express
11/24/2022
5:34
Mike Rounds Asks DoD Nom About Evolving Threats From Cyber Artificial Intelligence And Space Domain
Forbes Breaking News
5/7/2025
3:56
Cybersecurity is Entering a New Era
Cheddar News
1/16/2025
0:47
US Confronts Chinese Cyber-Espionage Threat: 'Worst Telecom Hack In Our Nation's History'
Benzinga
11/25/2024
2:13
Throwing Money at Cyber Security Won't Solve the Problem
FORA TV
3/29/2016
2:35
Jacky Rosen Asks DoD Official About Adapting Training Pipeline To Deter Changing Cyber Threats
Forbes Breaking News
4/15/2025
5:24
James Lankford Presses Trump Nominee On Protecting Infrastructure From Cyberattacks By Adversaries
Forbes Breaking News
6/10/2025
0:32
Biden Issues Executive Order For Tough Cybersecurity Standards
Benzinga
1/16/2025
4:08
Jacky Rosen Warns Of Cyber Threats From Foreign Adversaries Continuing To ‘Intensify Everyday’
Forbes Breaking News
4/15/2025
1:42
Firm falls victim to cyber attack after unwittingly hiring North Korean hacker
Bang Tech News
10/17/2024
0:55
New cybersecurity roadmap seeks to protect PH from ‘complex cyber threats’ – DICT
Manila Bulletin
1/20/2023
0:15
Suspected cybercrime boss gets arrested and extradited
National World - Viral Videos
8/14/2024
23:54
Cyber threats are evolving – Are you ready? | A Talk with Danny Kim
AWANI
3/13/2025
0:45
Chinese Hackers Breach Treasury, Targeting Sanctions And Intelligence Files
Benzinga
1/17/2025
2:28
Air Vice-Marshal Darren Goldie appointed cybersecurity coordinator
ABC NEWS (Australia)
6/23/2023
1:44
'Hacking frenzy': Australia becomes prime target for cyber crime
Australian Community Media
11/4/2022
20:05
How The Chief Security Officer Of CrowdStrike Approaches Cyberattacks
Forbes
12/23/2023
2:34
Companies to report ransomware attacks under new proposal
ABC NEWS (Australia)
7/30/2024
8:00
Cyber security: An insight into the business of keeping people safe
euronews (in English)
4/12/2023
1:09
Massive cyber attack: US nuclear weapons agency breached | Oneindia News
Oneindia
12/18/2020
0:32
China Accused Of Cyber Hacking
Benzinga
9/1/2021