Commentary: Energy Sector Cyber Threat Is Real; Greater Collaboration Is Part of the Answer

By: Christopher Burnham & Brian deVallance

This piece originally appeared in Homeland Security Today, October 9, 2018.

In June of 2017, when Wired magazine published a harrowing account of Russia’s hack of the Ukrainian electrical grid, it quickly generated broad discussion about the state of our nation’s cyber defense in the critical infrastructure (CI) sectors. But Washington is nearly 5,000 miles from Kiev, and Russia’s ability to take control of a Ukrainian power company through its IT helpdesk seemed even more remote.

Remote no longer. Dan Coats, the director of National Intelligence, recently testified before Congress that “the warning lights are blinking red again” and that “today the digital infrastructure that serves this country is literally under attack.” In March, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) issued a joint alert of Russian cyber activity seeking to disrupt the energy and other CI sectors.

While much remains to be done, the U.S. is headed in the right direction on cyber. First, there is growing consensus about what constitutes basic cyber hygiene or cyber defense – for example, the Critical Security Controls from the nonprofit Center for Internet Security. In addition, following the release of the federal government’s National Security Strategy last December, the White House issued its new National Cyber Strategy in September.

Earlier this year the Department of Energy unveiled its new Office of Cybersecurity, Energy Security, and Emergency Response (CESER), and the Senate has confirmed cyber-savvy Karen Evans as the office’s first assistant secretary. Just last week, DOE announced $28 million in technologies intended to improve the cybersecurity of power and energy infrastructure.

At the DHS Cyber Summit in July, Secretary Kirstjen Nielsen announced the creation of the National Risk Management Center (NRMC), DHS’s intended home for collaborative, sector-specific and cross-sector risk management efforts to better protect critical infrastructure. It is significant that DHS is highlighting the need to continue to build and strengthen partnerships as a part of fortifying American cybersecurity. As former DHS Deputy Secretary Jane Lute has noted, we have not yet decided, as a society, the precise role that government will play in protecting our national cyber resources. This is consistent with DHS’s enterprise approach of needing more than a single federal department to secure the homeland. Instead, we need the active partnership of all of us: state, local, tribal, and territorial (SLTT) governments; federal and SLTT law enforcement; nonprofit best-practice providers; the private sector; and the American public.

Jeanette Manfra, DHS’s assistant secretary for cyber, provides a cogent roadmap: We need to “create this collective defense model, where we all provide capabilities, authorities, and competencies to make cyberspace safer.”

For their part, the various CI sectors have been diligent in working to combat cybersecurity risk. Some CI sectors, like the natural gas industry, have been investing millions in new technologies to improve distributed control systems, cloud-based services, and data analytics. Additionally, sector-specific Information Sharing and Analysis Centers (ISACs) have allowed for improved information sharing between industry and the federal government. Top ISACs include the Multi-State ISAC, the Oil and Natural Gas ISAC, and the Financial Services ISAC, among other ISACs. Other positive industry actions include adopting voluntary best practices like the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity; participating in cross-industry exercises like Grid-Ex, where CI sectors practice responding to cyber-attacks; and continually educating employees on the latest cyber risks and threats.

With the establishment of the NRMC, Secretary Nielsen has issued a challenge and an invitation: private industry and the various national security agencies need to work together to help make this cross-sector, public-private partnership model a successful approach to increasing cyber defense in critical infrastructure.

The individual partners are making progress. We must now work together to create a collective defense.

IN-THE-NEWS: CGA President Douglas Lute and CGA Senior Advisory Francis Taylor co-author report for the IBM Center for the Business of Government

Recently CGA President Amb. Douglas Lute and CGA Senior Advisor Gen. Francis X. Taylor authored a report for the IBM Center for the Business of Government. The report, “Integrating and Analyzing Data Across Governments - The Key to 21st Century Security: Insights from a Transatlantic Dialogue,” focuses on data gathering, analysis, and dissemination challenges and opportunities across the homeland security enterprise. It especially looks at how improved information sharing could enhance threat prediction and prevention in a transatlantic context.

Lute and Taylor address how stakeholders in the U.S. and Europe can increase the understanding of effective ways to leverage channels involving technology, human capital, organizations, and private sector coordination that meet strategic, mission, and operational needs. The report highlights opportunities for governments to leverage data integration and analytics to support better decision making around cyber and homeland security.

The authors draw primarily on findings from two roundtable discussions with current and former government leaders and stakeholders. The first meeting, held in Washington, D.C. in October 2017, focused on how the U.S. Department of Homeland Security (DHS) information sharing enterprise can have the greatest impact and interaction with partners. The second meeting, held at the U.S. Mission to the European Union (EU) in Brussels in March 2018, focused on how the European Union and other European organizations and member states can work with U.S. agencies to enhance outcomes from improved information sharing.

Given the imperative for transatlantic and cross-sector collaboration to understand and respond to an increasingly complex set of threats facing governments, we hope that this report provides timely insights for public sector leaders and stakeholders.

Download and read the report here.

Commentary: Next frontier of Russian meddling: energy intimidation

By: Doug Lute

This commentary originally appeared in The Hill, August 28, 2018.

Russian meddling in the 2016 U.S. elections is now largely beyond debate. But this focus is too limited in scale and too narrow in scope. This is more than just a challenge to American elections. Russia has interfered repeatedly with democracies in Europe, including a number of our NATO allies. Putin has used cyberattacks, misinformation campaigns and support for rightist parties. He even attempted an overthrow of the government in Montenegro as they approached a national decision to join NATO.  

Another key vulnerability for many in Europe is their dependence on Russian energy, particularly natural gas. While Putin has yet to play this card beyond Ukraine, energy intimidation must be a national security concern among many of our NATO allies. In July, NATO leaders met in Brussels and reaffirmed the role that energy security plays in the common security of the alliance.

 

The European Union, which includes most of our NATO allies, gets about 40 percent of its natural gas from Russia. While Germany has been critiqued for importing about a third of its gas from Russia, allies in Lithuania and Estonia are 100 percent dependent on Russian gas. Concerns increase as the Nord Stream 2 pipeline would increase Russian imports to Europe. If Russia decided to manipulate these energy streams, or even intimidate by threatening to do so, it could cripple the European allies.

NATO is alert to this vulnerability, reaffirming during the recent summit that “it is essential to ensure that the members of the Alliance are not vulnerable to political or coercive manipulation of energy, which constitutes a potential threat.”

Given the dependence of our European allies on Russian energy, it is in U.S. national security interest to reduce Russian potential for influence by diversifying gas sources to Europe. U.S. liquid natural gas (LNG) production has nearly doubled since 2010 and exports of LNG quadrupled in 2017, with exports to Europe accounting for the third-largest share. This is a big step in the right direction as Europe seeks to diversify its energy sources. 

While the U.S. itself remains a massive consumer of LNG, production is expected to grow 59 percent between 2017 and 2050, increasing further the capability of the U.S. to export LNG to our allies. This is, of course, dependent upon adequate infrastructure for exporting and importing LNG, but the U.S. has opened two export terminals since 2016, with four more on the way. On the European continent there are now 28 LNG import terminals, with 22 more terminals planned or under consideration. 

The first tankers carrying U.S. LNG docked at Polish and Lithuanian terminals last year, and we can expect this to increase. This is a classic case where U.S. security interests and economic interests are mutually supportive.  

While expanding American LNG exports to Europe will help, other vulnerabilities remain for energy security. For example, cyberattacks can wreak havoc on energy infrastructure and some critics claim that American LNG companies face particular vulnerabilities. Cyber experts agree that any activity reliant on the internet can be at risk and must be protected. All forms of energy infrastructure face this challenge. As Professor Chris Bronk, an expert in computer and information systems at the University of Houston, recently told Reuters: “coal plants, train deliveries and transmission systems are just as susceptible to hackers as gas pipelines… [and] the stakes involved in a successful nuclear cyber attack are enormous.” 

The U.S. LNG industry takes responsible steps on cyber security. In line with new guidance from the Department of Homeland Security, the LNG industry orients its cybersecurity to the national standards and implements cybersecurity programs based on established best practices, including following the National Institute of Standards and Technology (NIST) Cybersecurity Framework, and sharing information through the Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC). While there is no perfect cybersecurity, such steps reduce the risk as we expand LNG production.

Energy security is national security. This means reducing the dependence of our European allies on Russian energy.  It is in the national interest of the U.S. to stand with our allies to do all that we can to help diversify their energy sources, and increased U.S. LNG export capacity provides the means to do so.

Douglas Lute was the U.S. ambassador to NATO from 2013 to 2017. He is a senior fellow at the Belfer Center at Harvard University, and president of Cambridge Global Advisors, a consulting firm with a special focus on national security, and experience at the global, national, state and local levels. 

Commentary: DHS’ Big Data Integration Challenge

By Francis X. Taylor

This commentary originally appeared in The Cipher Brief, August 8, 2018.

Department of Homeland Security Secretary Kirstjen Nielsen recently traveled from Washington D.C. to New York with her senior team in tow, to announce the creation of the National Risk Management Center.  It is intended to be DHS’ tip of the spear when it comes to information sharing between the public and private sectors about emerging and sometimes urgent, cyber security threats. 

In an opinion piece posted on CNBC, Nielsen said that the U.S. is not “connecting the dots” quickly enough and said “Between government and the private sector, we have the data needed to disrupt, prevent and mitigate cyberattacks.  But we aren’t sharing fast enough or collaborating deeply enough to keep cyberattacks from spreading or to prevent them in the first place.”

As DHS takes on a new collective defense strategy by putting a premium on public-private information sharing efforts, The Cipher Brief wanted to know a little more about how DHS itself stores and accesses the vast amounts of data it holds. 

Francis Taylor served as DHS’ Under Secretary for Intelligence and Analysis during President Obama’s second term.  One of his priorities was to figure out how DHS could better use data technology tools to increase its operational effectiveness.  It was an issue that he also had to tackle during his time in the private sector, where he worked as Vice President and Chief Security Officer for General Electric. 

Taylor shared his insights with The Cipher Brief, offering a better understanding of the current efforts within DHS to strengthen its capacities, especially at the enterprise level.  We also wanted him to explain what makes integration such a vexing task.

The Cipher Brief: Can you give us some strategic context around data analysis and integration?

Taylor:  Data analysis and integration is critical to how we protect our country and our border. After 9/11 the discussion was about “connecting the dots.” Today there are trillions of dots of information that are available to help us understand what individual, organization or nation- state represent a threat to our people, our country and way of life. Much of that information comes from around the world and allows us to push our analysis beyond our border to regions across the globe. Not only must DHS integrate the data that it collects in the performance of its mission, it must integrate that data with other data from open source, our international partners, and the intelligence and law enforcement communities to have a full picture of the threats we face.

The Cipher Brief:What kinds of data does DHS collect and store?

Taylor: DHS is the third largest department of our government.  DHS components comprise the largest number of federal law enforcement officers in our government and the department conducts its law enforcement mission worldwide.  It interacts daily (and collects information on) U.S. citizens, foreign nationals and U.S. and foreign businesses applying for benefits from the U.S. Government.  DHS also collects data in conjunction with its law enforcement and security missions enforcing U.S. immigration and trade security regimes, immigration violations, citizenship, refugee and asylum applications, and trusted traveler programs.  DHS stores all of this data in more than 900 unconnected databases and the information is kept in silos that are then accessed by the components to perform daily missions. Many of these databases were created long before DHS was established in 2003 and contain old technology that make it difficult to update and integrate.

The Cipher Brief:  How does the issue of data overload negatively impact DHS’ mission to protect the country?

Taylor: I believe that DHS has all the information it needs to proactively defend our country, but the information that is collected is not available to the operators for data analytics that would improve their understanding of threats to our homeland.  The amount of valuable intelligence sitting in DHS data systems is staggering and would be invaluable to DHS and the rest of the U.S. government if it was better analyzed and shared with the appropriate stakeholders.

The Cipher Brief:What is the DHS Information Sharing Enterprise and how does the National Vetting Center (NVC) support the overall mission?

Taylor: The DHS Information sharing enterprise is embodied in the DHS Information Sharing and Safeguarding Governance Board (ISSGB) which is chaired by the DHS Chief Information Officer and the DHS Under Secretary for Intelligence and Analysis. All of the components of the Department are represented on the ISSGB. Unfortunately though, the ISSGB has been largely ineffective in moving the needle within the Department to improve information sharing across the enterprise.  DHS component elements generally do not see value in integrating information across the enterprise.  And there is little incentive to change this paradigm, absent dedicated funding for the enterprise and a clear prioritization of this integration from the Department’s leadership.

The NSC established the National Vetting Center (NVC) in DHS to serve as a focal point for all USG vetting to support travel and border security. It is a logical enhancement to CBP’s National Targeting Center (NTC) that has developed and deployed significant capability in data analytics and integration that improves our understanding of threats to our travel and trade activities as well as our border. NVC envisions building on the NTC foundation to develop even more sophisticated tools and processes to vet individuals applying for benefits within our country.  As the Obama administration was transitioning, former DHS Secretary Jeh Johnson asked all senior staff what we would have done differently, based on what we had learned during our time at the helm.  My answer was that we should have moved ALL vetting for benefits administered by the Department to the National Targeting Center as a government-wide shared service.  My rationale was simple, the Secretary of DHS is the one official in our government that has the final say over who is allowed into our country, but the Secretary does not own the process to ensure that the vetting is effective and continues to improve.  I believe the NVC begins that process and will significantly improve how we make decisions across our government on applications for benefits.

The Cipher Brief: What is the state of DHS data integration and information sharing (i.e. HSIN)?

Taylor: The DHS Data Framework is a joint endeavor by the DHS CIO and Under Secretary for Intelligence and Analysis to build a data lake with the top 20 databases essential to the Department’s vetting and assessment mission. I understand the momentum of the data framework has slowed significantly. I also understand that CBP is driving the data framework as the next level of improvement in information sharing but that DHS headquarters support for initiative is lacking.

The Homeland Security Information Network (HSIN) continues to be the most effective system for DHS to communicate with its state, local, tribal, territorial and private sector partners. But it has real shortcomings.  It needs continued investment to make it more a data sharing platform and not just a communication platform.  HSIN does not allow for data searching and online queries.  This needs to change if the system is to continue to be valuable to DHS stakeholders at every level.

The Cipher Brief:Why is creating DHS-wide searchable data stores so difficult for the Department? Would DHS benefit from a data integration acquisition and standards czar?

Taylor: Most law enforcement organizations are organized to pursue investigating and interdicting wrong doers.  It is the most important aspect of the mission, and I share focus on these priorities.  However, the absence of an integrated data system denies DHS components and others the ability to fully exploitat the information stored in Department systems.  This is inefficient. The lack of an integration function at the headquarters-level makes fixing this shortcoming harder.  The original vision for the Department was to have little centralized-control of operations and to keep operational power within the components.  Each DHS component approaches its missions from its own narrow organizational mission perspective. The components have built processes and procedures from their individual operational perspectives and not from the perspective of how these procedures can be more effectively integrated to meet the collective mission of the Department.  Add to this the fact that budgeting and oversight of the Department is controlled by more than 80 Congressional oversight committees and you can imagine the dysfunction and disincentive to collaborate.

The Cipher Brief: Finally, how do blockchain, advanced encryption or other types of algorithms increase the likelihood of safe data sharing across the DHS Information Sharing Enterprise?

Taylor:  All of the new information analysis technologies will greatly improve information sharing in the Department. Some of this technology is already in use in some of the components; yet it is not systematic and does not optimize the use of these technologies.

IN-THE-NEWS: CGA President Doug Lute Participates in Five Eyes Roundtable

View the full event HERE.

At a time of growing international instability, the Five Eyes intelligence arrangements (which brings the UK together with the United States, Australia, Canada and New Zealand) is of vital important to the security of Britain and its allies.

While questions are being raised over the long-term future of NATO, Five Eyes represents another crucial pillar of our national security – mitigating threats from hostile states, terrorism, and other non state actors. Why does the continuation of the Five Eyes matter and what can be done to support and enhance it for the challenges ahead? A distinguished panel, including two former Prime Ministers, a former NATO Secretary General, and a former Former US Permanent Representative to NATO, discussed these issues in this unique event.

Panelists:

Rt Hon Stephen Harper PC, Canada’s 22nd Prime Minister Hon

John Howard OM AC, Former Prime Minister of Australia

Ambassador Douglas Lute, Former US Permanent Representative to NATO, Former US Deputy National Security Advisor

Rt Hon Sir Donald McKinnon ONZ GCVO, Former New Zealand Minister of Foreign Affairs and Trade and Former Secretary General of the Commonwealth

Rt Hon the Lord Robertson of Port Ellen KT, Former Secretary General of NATO, Former UK Secretary of State for Defence

PRESS RELEASE: Cambridge Global CEO Jake Braun Presents DEFCON Voting Village Report at LRPP Conference

June 28, 2018 (Singapore) - This week, Cambridge Global Advisors (CGA) was proud to announce that CEO Jake Braun presented the 7th Annual International Conference on Law, Regulations, and Public Policy (LRPP) in Singapore.  Hosted by the Global Science & Technology Forum (GTSF), the conference brings together public sector leaders from around the world to discuss the latest developments in legal, policy, and regulatory space.

Bruan’s presentation featured a discussion on the ground-breaking “Voting Machine Hacker Village” demonstration at last year’s DEFCON -- the largest, longest running hacker conference in the world. Coming at a time when intelligence and news was emerging about Russian-backed attempts to hack U.S. voting infrastructure during the 2016 election, the DEFCON Voting Village sought to serve as an awareness-building opportunity.  The Village assembled more than 25 pieces of election equipment including voting machines and pollbooks still widely used in U.S. elections today and made them accessible to thousands of hackers.

Following on the Voting Village demonstration, Braun and several other Village organizers co-authored an award-winning report, detailing the Voting Village findings. The report can be accessed here.

In presenting this report at the LRPP 2018 Conference, Braun furthered his efforts to raise awareness about the severity and pervasiveness of cyber threats facing not only the U.S. but also democracies around the world.

“Nefarious cyber actors, including but not limited to Russia, know no boundaries,” said Braun. “What the DEFCON Voting Village revealed last year is that this is election security a global problem that will continue to persist. We have to work together, across all nations, in the cyber, public policy and legal arena to make our elections more secure. LRPP gives one forum to start and continue this important conversation.”

The Voting Village is slated to run again at this year’s DEFCON, August 9-12, 2018, hosted annually in Las Vegas.

 

###

About CGA

Cambridge Global Advisors is a strategic advisory services firm with deep expertise at the global, national, state and local levels. CGA assists clients in the management, development, and implementation of their programs, practices, and policies – with a special emphasis on homeland and cybersecurity. CGA works with government, non-profit organizations, and Fortune 500 companies to provide consulting and project management services as well as public diplomacy, stakeholder engagement, and communications.  To learn more, visit www.cambridgeglobal.com or follow on Twitter at @camb_global

Commentary: National Vetting Center a Needed, Not Controversial, Security Asset

By Francis X. Taylor

This commentary originally appeared in Homeland Security Today, June 11, 2018.

For decades the U.S. has screened and vetted those who wish to enter the United States or apply to come to U.S. as visitors, immigrants or refugees. While technology and threats have changed, what has remained the same is the need for our officials on the front lines to have the most up-to- date and accurate information to decide who should or should not be allowed to enter our country.

To that end, earlier this year the National Vetting Center (NVC) was created to strengthen, simplify, and streamline the complex, ad hoc, and sometimes inefficient ways that intelligence is used to inform operational decisions related to screening and vetting. Despite the hype, I believe the NVC should not be viewed as part of the heated national debate on extreme vetting. Instead, the NVC should be viewed as the continuing improvement of effective security processes to improve the security of our travel, immigration and trade infrastructure. Specifically, I believe there are three added benefits to the government and to America’s overall national security posture with the launch of the NVC.

First, the practices and procedures that the U.S. government uses for screening and vetting must be dynamic and continually evolve in terms of throughput, redress, privacy, and accuracy. The NVC is a positive step in that direction. Following the 9/11 terrorist attacks, the U.S. created a system to better protect the homeland against potential terrorists. Lessons learned after each attempted terrorist plot since 9/11 caused the government to incrementally mature the system but never fully institutionalize these best practices in one organization.

While U.S. intelligence, law enforcement and security professionals continue to scour the globe for transnational criminals, spies, drug smugglers and weapons proliferators trying to enter the country illegally or with bad intent, the NVC can serve as a single place to analyze a broader set of applicable government information – with the right privacy regime to ensure that the right analysts have access to the proper information at the right time.

Second, I believe the NVC is a smarter use of the government’s existing knowledge, expertise, and money, as well as a realization of the post-9/11 mission to connect the dots of those transiting to the homeland for nefarious reasons.

Threats are not the only thing that have changed since the turn of the century. Technology has clearly evolved at a near exponential pace. Through the NVC, federal agencies will have the ability to use the NVC’s tools and analytic programs in a consolidated, efficient, and streamlined fashion with greater accuracy and speed than ever before. This approach would allow for secure information sharing at a volume and speed that was not possible just five years ago.

Through the creation of the NVC, the U.S. government will have an agile center that can evolve as the threats to the homeland evolve. The threat picture is ever-evolving and the government needs to move quicker to counter the tools that our adversaries are using. Today’s technology will allow agencies to maintain control of their data and permit it to be accessed securely and only by those with the right and proper authorities for the purpose of a specific, legally authorized screening mission.

Finally, the NCV will allow for better coordination and collaboration. Right now, agencies are screening and vetting people properly and with much success – the system is not broken. But we can do it better. And we can expand the work beyond the counterterrorism-only focus of the past 17 years. The NVC will allow for a “task-force” approach to these activities rather than the ad hoc mechanisms that currently exist. Co-locating vetting analysts from different agencies will allow these trained professionals to collaborate, share information where appropriate and access the expertise that resides within each agency to make better, more timely and more informed decisions – including redress decisions. And this scalable model will provide agencies the flexibility to meet the evolving threats we no doubt will face in the coming years as terrorists, criminals and others change their tactics in an attempt to evade the latest vetting protocols.

As the former Under Secretary for Intelligence and Analysis at Department of Homeland Security (DHS), I helped to tackle these same issues while serving in the last administration. I commend DHS for picking up where we left off. And it is my hope that they can build on our path to strengthen this capability with the right outcomes from the start.

It is important that the NVC is a government asset and does not belong to one department or component. It is also important that the NVC is a truly joint facility that allows assignees from across the interagency to collaborate, co-train, and fuse intelligence and experience within the art of screening and vetting. I wish the first director of the NVC my very best: This problem is not insignificant and yet the solution is ever-critical to the protection of our homeland.

Press Release: CGA Principal Francis Taylor Keynotes 2018 IALEIA/LEIU Training Conference

Former DHS Intel Leader Raises Information Sharing Issues Critical to the Work of U.S. Intelligence & Law Enforcement Community

Anaheim, CA (April 9, 2018) Today, Cambridge Global Advisors (CGA) was proud to announce that Principal Francis X. Taylor, former Under Secretary for Intelligence and Analysis at the U.S. Department of Homeland Security, provided keynote remarks at the 2018 International Association of Law Enforcement Intelligence Analysts (IALEIA)/Law Enforcement Intelligence Units (LEIU) conference. The annual joint IALEIA/LEIU gathering brings together hundreds of information analysts, operators and law enforcement professionals for training and discussion on the nation’s most pressing homeland security threats.

Focusing on a theme of enhanced information sharing and technologies that promote “getting information to the point of attack” to enable better decision making, Mr. Taylor’s speech raised several top-of-mind incidents including the tragic Parkland, Florida school shooting, cyberattacks to U.S. critical infrastructure and the migration crisis putting pressure on European partners.

“This audience represents the tireless set of professionals keeping us safe on the home front, but it’s not enough for them to understand and communicate within their own communities effectively,” commented Taylor. “Today’s threats – such as terrorism acts, nation-state interference, criminal activities, or even rouge cyberattacks – often originate outside of the U.S. Events in any part of the world can impact any local jurisdiction in the bat of an eye.  That’s which is why national/international enhanced information sharing and technologies like artificial intelligence, innovative data aggregation tools represent the future of homeland security.”

The IALEIA/LEIU conference kicked off on Monday, April 9 and will run through the week, featuring panels, plenary sessions and training opportunities. Full remarks from Mr. Taylor’s speech will be available online following Monday’s speech at

###

About CGA
Cambridge Global Advisors is a strategic advisory services firm with deep expertise at the global, national, state and local levels – with a special emphasis on homeland and cybersecurity. CGA works with government, non-profit organizations, and Fortune 500 companies to provide consulting and project management services as well as public diplomacy, stakeholder engagement, and communications.  To learn more, visit www.cambridgeglobal.com or follow on Twitter at @camb_global

Press Release: India Launches First-Ever Gov Cyber Training Program

Cambridge Global CEO & University of Chicago Lecturer, Jake Braun, Leads Historic Effort to Massively Scale India's Cyber Workforce

(Gujarat, India. March 21, 2018) This week, Cambridge Global Advisors (CGA) was proud to announce that CEO Jake Braun participated in a groundbreaking Cyber Security and Governance training effort for the Government of the  Indian State of Gujarat. Conducted through the University of Chicago, where Braun also serves as a cyber policy lecturer, Braun helped to deliver cyber policy training more than 240 senior executives from the Government of Gujarat, India. The training culminated in an MOU signing and press event on Tuesday, March 20 that featured leaders from the partnership organizations: Dr. Rajiv Gupta, Additional Chief Secretary, Labour and Employment Department Government of Gujarat & M.D., GNFC Ltd. and Dr. Balaji Srinivasan, Vice President, University of Chicago.

Touted as the first-of-its-kind in India, the partnership is currently administering a "train the trainer" cybersecurity program that will help India achieve its goals of scaling a massive government cyber workforce in the next few years. Along with several new national policies that have critically impacted India's needs for government cyber jobs, the nation has already made historic moves to digitize its currency and implement a monumental biometric data program. Under the University of Chicago curriculum model, participating senior executives will, in turn, train thousands of students at India's Industrial Training Institutes (ITIs) to fill cyber jobs and carry out government cyber operations critical to bolstering India's economy, positively impacting its global footprint, and safeguarding national security.

Of the training, Jake Braun said: "In this global and modern world, cybersecurity is an issue without borders. As more people come online, the challenge of filling cyber vacancies to meet evolving demand is a commonality that governments of all sizes encounter. I couldn't be more honored to support this mission in Gujarat, and to partner with the University of Chicago to equip what is soon-to-be one of the nation's largest cyber workforce bodies on the best policies and practices to keep all citizens safe and secure online."

With years' worth of experience in cyber policy and cyber workforce development issues, CGA is a strategic advisory services firm with deep expertise and experience at the global, national, state and local levels. The firm is currently working with U.S. government entities including the U.S. Department of Homeland Security to identify solutions and strategies to train and bolster its own cyber workforce.

Under the University of Chicago's program, Jake Braun is slated to conduct additional trainings over the coming months in Gujarat.

###

About CGA
Cambridge Global Advisors is a strategic advisory services firm with deep expertise at the global, national, state and local levels. CGA assists clients in the management, development, and implementation of their programs, practices, and policies – with a special emphasis on homeland and cybersecurity. CGA works with government, non-profit organizations, and Fortune 500 companies to provide consulting and project management services as well as public diplomacy, stakeholder engagement, and communications.  To learn more, visit www.cambridgeglobal.com or follow on Twitter at @camb_global