Homeland Secretary, Top Cybersecurity Officials Meet with Silicon Valley Leaders to Stress Cybersecurity Priorities

Homeland Secretary, Top Cybersecurity Officials Meet with Silicon Valley Leaders to Stress Cybersecurity Priorities

Secretary of Homeland Security Secretary Alejandro N. Mayorkas, National Cyber Director Chris Inglis, Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly, and DHS Under Secretary for Policy Rob Silvers recently met with industry leaders in technology, business and cybersecurity to discuss how the government and the private sector can better and proactively partner to tackle the most pressing cybersecurity challenges.

“Cybersecurity threats impact individuals, communities, and organizations of all sizes.  Increasing nationwide cybersecurity resilience is a top priority for DHS and the Biden-Harris Administration,” said Secretary Mayorkas.  “We are taking proactive steps to elevate our operational cooperation with the private sector to new heights, prioritizing our shared goal of defending a secure digital future,” said Chris Inglis, national cyber director. “Cybersecurity is a team sport and we each have a vital role to play.

“Collaborating with the private sector is instrumental in the Administration’s holistic approach to tackling some of the nation’s challenging cybersecurity issues. That is why I welcomed the opportunity to meet with government and industry leaders in Silicon Valley to build those relationships and identify areas and opportunities for collaboration. I look forward to continued participation in this important effort.”

This meeting included substantive discussions aimed at improving cybersecurity-related public-private partnerships, including by strengthening operational collaboration and defining metrics of success. The discussion, which was rooted in a comprehensive analysis of the evolving threat environment, focused on what government and industry can do together to build global cybersecurity resilience.

"CISA’s Joint Cyber Defense Collaborative (JCDC) is uniquely positioned to be the front door to government for cybersecurity defense. The JCDC brings together in one place the talent, expertise, and capabilities of the federal cybersecurity ecosystem with the ingenuity, innovation and imagination of the private sector to plan and exercise against the most serious threats; and drive down risk to the Nation at scale,” said CISA Director Jen Easterly.  “I was thrilled to meet yesterday with members of the JCDC and other key industry leaders to discuss how to strengthen operational collaboration and information sharing to help protect the American people and our critical infrastructure.”

“Our strategy is to operationalize industry partnerships to protect our critical infrastructure from cybersecurity threats,” said Rob Silvers DHS Under Secretary for Policy. “The discussion was an opportunity to hear from them what they need from the government and how we can better work on shared goals. We will continue to build on this public-private partnership to protect the American people.”

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3