April 3, 2015
 In 2014, the Atlantic Council's Cyber Statecraft Initiative continued to promote its ideas on Saving Cyberspace, examining the best (and worst) cyber futures, and collaborating on groundbreaking ideas with Fortune 500 companies, governments, and other stakeholders. The overarching goal of the Initiative partners was to ensure that the Internet and cyberspace remain at least as free, and as awesome, for future generations as they have been for ours. The big push for 2014 was to convince the United States and other governments to put the private sector at the center of their cybersecurity efforts, instead of considering them as mere afterthoughts or partners.

pdfDownload 2014 Year in Review: Saving Cyberspace

Contents
The program hosted over fifty events, from one-on-one meetings with senior foreign officials to large conferences like the 'Cyber Stability and Security in the Gulf' held in Abu Dhabi or the first-ever national security cyber policy competition for students 'Cyber 9/12 Student Challenge.' The program concluded its groundbreaking work with the Zurich Insurance Group resulting in the publication of the Beyond Data Breaches: Global Interconnections of Cyber Risk report, in addition to four other major papers and reports. In collaboration with McAfee, part of Intel Security, the Cyber Statecraft Initiative embarked on a journey to change the debate about cybersecurity, with the aim to shift the focus from doom and gloom to how cybersecurity underpins innovation and prosperity.

By going beyond the current issues, the Initiatives' experts, projects, and ideas were featured in multiple broadcast interviews, received media mentions in major national news outlets including the Washington Post, Bloomberg News, Wired, CNN, The Economist, and Financial Times, and published opinion pieces in more than a dozen outlets. Initiative's ideas on Saving Cyberspace were featured at TEDx talk, Black Hat, and DefCon conferences.

In 2015, the Initiative, together with its partners, will continue to study best and worst case scenarios in the path towards a sustainable cyberspace. This vision for a sustainable cyberspace is achieved by turning the historic relationship around so that the defenders finally have the advantage over attackers (D>O, or even better, D>>O). The way to this vision is a private-sector centric strategy, which harnesses the agility and subject matter expertise of the private sector and places prosperity and innovation as the foremost goal of cybersecurity.

MAJOR PROJECTS for SAVING CYBERSPACE

1. Global Aggregations of Cyber Risk
The Atlantic Council's Cyber Statecraft Initiative, in partnership with Zurich Insurance, completed its year-long effort to examine the similarities of financial risk and cyber risk. In each, complexity, hyperconnectivity, and correlated risks could become systemic threats to the entire system. The recommendations, such as resilience and insurance, in Beyond Data Breaches: Global Interconnections of Cyber Risk aim to better prepare governments and businesses for the inevitable cyber shocks of the future by outlining several concrete steps to build resilient systems.

Watch a video portraying the pioneering collaboration between the Initiative and Zurich Insurance here.

2. Cyber 9/12 Project
The Cyber 9/12 Student Challenge, organized by the Cyber Statecraft Initiative, is an annual competition devoted to challenging students to formulate and present policy recommendations for responses during a major cyber incident. In 2014, eighteen teams of students competed in front of a panel of judges from the highest levels of the US Department of Defense and US Department of Homeland Security, as well as from prestigious academic institutions and leading cybersecurity companies.

3. Influencing Policy Debate on NATO Cyber Defense Policy
The Atlantic Council's Cyber Statecraft Initiative continued to shape the debate on NATO cyber defense policy by engaging stakeholders in a debate before and after the NATO Summit in Wales. The Initiative expanded its work with NATO by convening stakeholders and formulating ideas and recommendations for the developing NATO cyber defense. These efforts culminated in a discussion with high-level US and NATO officials on cyber defense mission and capabilities following the launch of the new NATO policy, the only event of its kind held in Washington, DC. In addition, the Cyber Statecraft Initiative successfully completed a major project with NATO's Science for Peace and Security Program on confidence-building measures in cyberspace

4. Cybersecurity for Prosperity
The Cyber Statecraft Initiative and McAfee, part of Intel Security, launched a joint effort to change the nature of the debate around cybersecurity. Too often in the past, cybersecurity professionals and stakeholders have focused on the threats and challenges if we get security wrong rather than on its vast possibilities for innovation and prosperity if we get it right. By changing the focus of the debate, this joint effort aims at assisting policy and decision makers to formulate approaches that will create a balanced environment promoting not only security but also innovation.

Back to the top

MAJOR EVENTS

  1. The Cyber 9/12 Student Challenge on February 7-8, 2014. The Cyber Statecraft Initiative held its second annual student competition devoted to national security policy recommendations for responses during a major cyberattack. Teams comprising nearly a hundred students, from twenty-four universities as far afield as Turkey and Estonia, gathered in Washington, DC to compete.
  2. Workshop on Confidence-Building Measures in Cyberspace held in collaboration with the Swedish Institute for National Defense and Security Policy Studies on March 25-27, 2014. The workshop convened twenty-six experts from sixteen countries to discuss multi-stakeholder approaches to confidence-building measures to improve security and stability in cyberspace. The project was supported by the NATO Science for Peace and Security Programme and resulted in a report outlining four types of multi-stakeholder measures.
  3. Launch of Beyond Data Breaches: Global Interconnections of Cyber Risk report on April 16, 2014. This groundbreaking report, commissioned by Zurich Insurance and written by the Atlantic Council's Jason Healey, analyzes interconnected cyber risks and outlines several concrete steps to avoid inevitable shocks of the future and prevent what could be called a "cyber sub-prime." The report release was accompanied by a panel discussion moderated by Francis Rose, host of Federal News Radio's In Depth with Francis Rose. The panel featured Dr. Steve Crocker, Board Chair of ICANN, Jason Healey, and Catherine Mulligan and Dan Riordan of Zurich Insurance.
  4. Speaking engagement at the Black Hat and DefCon Conferences, the world's largest annual hacker and cybersecurity professionals' conventions. Jason Healey spoke about his core strategy for assuring sustainable cyberspace and his ideas on "Saving Cyberspace" from August 4-8, 2014.
  5. Major Conference "Stability and Security in the Gulf" held at New York University in Abu Dhabi, United Arab Emirates on October 13, 2014. The event consisted of a series of panels with experts from both the United States and the Gulf Region who discussed a wide array of topics ranging from information sharing to protecting critical infrastructure.

Back to the top

 SELECTED EVENTS

In-House Events

  1. Panel discussion "Cyber Risk Wednesday: Cyber Resilience through Measurement" on January 15, 2014 at the Atlantic Council. The fourth event in the series featured Dan Geer, Chief Information Security Officer at In-Q-Tel, Wade Baker of Verizon, Yurie Ito of Japan Computer Emergency Response Team, and Kevin Sullivan of Microsoft, and was moderated by Jason Healey. The panel discussed data-driven methodical and systematic understanding of cyber risks and solutions.
  2. Roundtable "Predictive Cyber Situational Awareness: Seeing Beyond the Perimeter" on January 24, 2014. The event focused on discussing technical and non-technical measures to extend cyber warning beyond the traditional perimeter.
  3. Public event "Captains of Industry" on March 5, 2014. Jason Healey moderated a discussion on national security issues with David Zolet, Executive Vice President and General Manager of Computer Sciences Corporation.
  4. Roundtable "The Cyber Dimension of a Conflict in Ukraine" on March 10, 2014. Jason Healey discussed the role of cyber tools in the Ukraine crisis with international journalist.
  5. Panel discussion "Cyber Risk Wednesday: Risk and Resilience for the Financial Sector" on March 19, 2014 at the Atlantic Council. The fifth event in the series featured John Carlson of Financial Services Roundtable, Brian Peretti of the US Department of the Treasury, Lilly Thomas from the Independent Community Bankers of America, and was moderated by Neal Pollard, Nonresident Senior Fellow with the Cyber Statecraft Initiative. The panel discussed cybersecurity challenges facing the financial sector and methods of reducing existing and future vulnerabilities.
  6. Private roundtable with European journalists and policy makers visiting through the Department of State's International Visitor Leadership Program on March 20, 2014. Klara Tothova Jordan discussed with the group how the European reactions to the NSA affair affect US-European cooperation in national security areas.
  7. Roundtable "Challenges and Opportunities of Internet Voting" on May 5, 2014. This was the first installment in the joint project between the Cyber Statecraft Initiative and McAfee, part of Intel security, focusing on interconnections between cybersecurity, innovation, and prosperity by analyzing opportunities and security challenges of Internet voting.
  8. Roundtable discussion on the cyber element of contemporary military operations with Brigadier General Timothy Carmichael, Commander of NATO Rapid Reaction Corps on May 6, 2014.
  9. Public event "National Security and Digital Prosperity after Snowden" on June 9, 2014. Jason Healey moderated a discussion featuring David Ignatius, editor and columnist for the Washington Post, Cheri McGuire, Vice President of Global Government Affairs and Cybersecurity Policy at Symantec Corporation, and Jeff Moss, Nonresident Senior Fellow at the Atlantic Council's Cyber Statecraft Initiative. The panel discussed the impacts of Snowden's revelations on the future of cybersecurity and prosperity.
  10. Roundtable discussion hosting Ambassador Latha Reddy, former Deputy National Security Adviser of India, on June 13, 2014 for a discussion on the latest developments in the area of Internet governance.
  11. Roundtable "Networked Medical Devices" on June 27, 2014. The Cyber Statecraft Initiative and McAfee, part of Intel Security, brought together industry and security experts to discuss opportunities and security challenges of networked medical devices.
  12. Roundtable discussion "Breaking the Cyber Info Sharing Logjam" organized in collaboration with CISCO on August 20, 2014. The roundtable gathered government, industry, and cybersecurity stakeholders to discuss the obstacles and possible solutions to current challenges in cyber information sharing.
  13. Briefing "Future of NATO-Japan" on August 26, 2014. Jason Healey briefed the NATO's Allied Command Transformation team on possibilities of NATO-Japan collaboration on cybersecurity issues.
  14. Public event "Online Voting: Rewards and Risks" on October 8, 2014. The event featured a keynote speech by Congressman James Langevin, Co-Chair of the Congressional Cybersecurity Caucus and a panel discussion by Joseph Lorenzo Hall, Chief Technologist at the Center for Democracy and Technology, Kent Landfield, Director of Standards and Technology Policy at McAfee, Jordi Puiggali, CSO and SVP at Scytl, and Pamela Smith, President of Verified Voting, and was moderated by Jason Healey. The panelists described the current online security environment and how online voting and e-voting could become a larger part of the political process in the United States and in other participatory democracies with the right security to back it up.
  15. Event series of "Cyber Risk Wednesday: Landscape of the Cyber Threat." The event featured Dmitri Alperovitch, founder and CTO at CrowdStrike, and Tom Corcoran, Senior Policy Adviser of the House Permanent Select Committee on Intelligence, and was moderated by Jason Healey. The panelists discussed the current landscape of the persisting cyber threat and how it can be mitigated.
  16. Public event "Cyber Risk Wednesday: NATO's Cyber Defense Mission and Capabilities" on November 5, 2014 at the Atlantic Council. The event featured H.E. Sorin Ducaru, Assistant Secretary General for Emerging Security Challenges for NATO, Christopher Painter, Coordinator for Cyber Issues at the US Department of State, and Jason Healey, and was moderated by Vago Muradian, Editor for Defense News. The panelists discussed the latest developments in NATO cyber defense policy and the application of collective defense to the cyber domain. The event was accompanied by the release of two new Atlantic Council publications. The first, NATO's Cyber Capabilities: Yesterday, Today, and Tomorrow, analyzes the development of NATO's capabilities. The second publication, Confidence-Building Measures in Cyberspace: A Multistakeholder Approach for Stability and Security, is a report containing a diverse set of avenues to increase stability and build confidence in cyberspace without extensive legal or political action by states
Outside Events

  1. Discussion "US Approach to Cyber Security" on December 2, 2013. Jason Healey moderated a panel discussion featuring Jane Holl Lute, Former Deputy Secretary of Homeland Security, at the annual NATO Parliamentary Assembly at the National Defense University.
  2. Speaking Engagement "Critical Infrastructure Protection" on December 11, 2013 with Homeland Security Studies and Analysis Institute.
  3. Private dinner "Rebuilding EU-US Trust and Cooperation in Cyberspace" on January 31, 2014, held at the Munich Security Conference. The dinner conversation examined the implications of the National Security Agency (NSA) revelations and discussed a way forward on rebuilding transatlantic trust and cooperation in cyberspace.
  4. Speaking engagement at RSA Security on February 28, 2014. Jason Healey delivered a speech on "Eight Conflicts Which Changed Cyberspace" and moderated a panel on "Cyber Battlefield: The Future of Conflict."
  5. Speaking engagement "Risks Revealed," at an event convened by The New Yorker on March 11, 2014. Jason Healey spoke on a panel with Catherine Mulligan, Senior Vice President of Zurich Insurance's Special Products on information security, privacy liability, and building a culture of awareness on cyber threats within organizations.
  6. Speaking engagement "Charting NATO's Next Chapter: A Post-Afghanistan Alliance" organized by the Atlantic Council's Brent Scowcroft Center on International Security and the Norwegian Institute for Defense Studies in Oslo, Norway on March 19, 2014. Jason Healey discussed the post-2014 challenges for NATO as it draws down from its mission in Afghanistan.
  7. Speaking engagement at the Pritzker Military Library in Chicago on April 11, 2014. Jason Healey spoke about the history of cyber conflict analyzed in his book, A Fierce Domain: Conflict in Cyberspace, 1986 to 2012.
  8. Speaking engagement at RIMS Conference "Risk Management" in Denver, Colorado, on April 28-29, 2014. Jason Healey discussed the findings and recommendations from the Beyond Data Breaches: Global Interconnections of Cyber Risk report.
  9. Speaking engagement at the International Financial Risk Institute on May 9, 2014. Jason Healey and Axel Lehman, the Chief Risk Officer of Zurich Insurance, discussed current cyber risks and ways to mitigate them.
  10. Speaking engagement "Snowed Under: Balancing out Security and Privacy" at the 2014 GLOBSEC conference on May 14-16, 2014. Jason Healey moderated a discussion on mass-surveillance and data collection in a post-Snowden world featuring H.E. Carl Bildt, Minister of Foreign Affairs of Sweden, Michael Chertoff, former US Secretary of Homeland Security, Shlomo Shpiro of the BESA Center for Strategic Studies, and Marietje Shaake, Member of the European Parliament.
  11. Speaking engagement "Building Resilience, Reducing Risks" at Chatham House, London, on May 20, 2014. Jason Healey spoke about public-private partnerships in addressing critical cyber security issues.
  12. Speaking engagement "Overhauling Transatlantic Security Thinking" at the Security Defense Agenda in Brussels on June 4, 2014. Jason Healey spoke on a panel with H.E. Sorin Ducaru, NATO Assistant Secretary General for Emerging Security Challenges, Souad Mekhennet, Special Correspondent of the New York Times, and Lt. Gen. Wolfgang Wosolsobe, Director General of the EU Military Staff in Brussels.
  13. Speaking engagement. Jason Healey Presented the Zurich report, "Beyond Data Breaches: Global Interconnections of Cyber Risk", at BITS conference on June 3.
  14. Speaking engagement "History of Cyberspace" at the Australian Strategic Policy Institute on June 18, 2014. Jason Healey spoke about the eight conflicts that changed cyberspace.
  15. Speaking engagement at the "Combatting Emerging and Increasingly Sophisticated Cyber Threats" conference organized by the Australian Defense Magazine in Canberra, Australia on June 19, 2014. Jason Healey delivered the opening remarks.
  16. Speaking engagement at the "Asia Cyber Liability Conference" organized by Asia Insurance Review in Singapore from July 2-3, 2014. Jason Healey spoke on a panel with Gib Sorebo, Chief Cybersecurity Technologist at Leidos, and Damian Lynch, Head of Financial Institutions, Management Liability Specialist - Asia Pacific at the Zurich Insurance Group. The panel discussed findings and recommendations from the Beyond Data Breaches: Global Interconnections of Cyber Risk report.
  17. Speaking engagement. Jason Healey spoke at Reactions Magazine Midwest Insurance Summit in Chicago on July 9, 2014.
  18. Speaking engagement at the "Global Talent Management: Attraction, Development, and Deployment" event organized by the National Foreign Trade Council Foundation in New York from July 15-16, 2014. Jason Healey presented the findings and recommendations from the Beyond Data Breaches: Global Interconnections of Cyber Risk and shared his corporate cyber-risk management experiences with a major financial services firm.
  19. Speaking Engagement at "Risks and Benefits in an Interconnected Economy" event organized by Information Technology Industry Council on October 1, 2014. Jason Healey spoke on a panel discussing cybersecurity as an economic and innovative issue.
  20. Presentation at TEDx, the global innovative conferences on "Saving Cyberspace" on October 4, 2014 in Bermuda. Jason Healey spoke about his ideas on sustainable cyberspace.
  21. Speaking Engagement "Saving Cyberspace and the Cyber Sub-Prime" at the Institute of International Finance and at the International Energy Forum on October 9. Jason Healey spoke at several panels to hundreds of members at the annual members meeting of the Institute of International Finance, held in conjunction with the IMF and World Bank. He also spoke in front of a cybersecurity conference of the International Energy Forum. The focus of each discussion was on saving cyberspace and the risks presented by a potential cyber sub-prime incident.

Back to the top

PUBLICATIONS AND MEDIA

Major Publications
  1. Report Beyond Data Breaches: Global Interconnections of Cyber Risk. This report is the result of a year-long effort between Zurich Insurance Company Ltd and the Atlantic Council’s Cyber Statecraft Initiative, a project which encompassed meetings on four continents and consultations with cyber experts and risk professionals across different industries. The report looks into possible aggregations of cyber risks that in the future can and will affect globally interconnected systems, such as electrical grids and worldwide logistics systems, and provides recommendations for several concrete steps that must be taken to overcome these inevitable shocks of the future.
  2. Report Online Voting: Rewards and Risks. The Cyber Statecraft Initiative partnered with McAfee, part of Intel Security, to conduct a study that explores how online voting and e-voting could become more integrated in the international political process if particular technologies and processes are implemented to ensure its security.
  3. Report NATO’s Cyber Capabilities: Yesterday, Today, and Tomorrow. In September 2014, the Cyber Statecraft Initiative released an updated issue brief arguing that although NATO has greatly improved its cyber capabilities over the past decade, there is still much work left to be done.
  4. Report Confidence-Building Measures in Cyberspace: A Multistakeholder Approach for Stability and Security. This report is the result of discussions among participants at the NATO Advanced Research Workshop on Confidence-Building Measures in Cyberspace conducted in March 2014 in Stockholm, Sweden. The report analyzes different ways to involve private sector actors and build confidence without extensive legal or political action by states. In conclusion, it recommend four types of CBMs--collaboration, crisis management, restraint, and engagement measures--which can be established to mitigate potentially escalatory effects of activities in cyberspace.
  5. Report Online Voting: Rewards and Risks. The Cyber Statecraft Initiative partnered with McAfee to release a report arguing that online voting and e-voting could become a larger part of the political process in the United States and in other participatory democracies with the right security to back it up.

Opinion Pieces
  1. Surviving Cyber’s Subprime Moment” on April 16, 2014, Jason Healey co-authored with Michael Kerner, Zurich’s CEO of General Insurance, an op-ed on how managing systemic risk will help to avoid catastrophe down the line, which was published in US News.
  2. Managing Internet risks to prevent a cyber catastrophe” on April, 29, 2014, Jason Healey and Dan Riordan wrote for the Denver Post on managing Internet risks to prevent future cyber catastrophes.
  3. The Road to Cybersecurity Runs Through Omaha” on May 5, 2014, Jason Healey wrote about why Warren Buffet may be the key to increasing support for the government's cybersecurity efforts in US News.
  4. The Internet: A Lawless Wild West” on June 11, 2014, Jason Healey wrote for the National Interest on the importance of keeping the Internet as resilient, free, and secure for future generations as it has been for ours.
  5. Reexamining Article 5: NATO’s Collective Defense in Times of Cyber Threats” on June 13, 2014, Klara Tothova Jordan wrote for the Huffington Post on why NATO must substitute strategic ambiguity for clarity in formulating how the collective defense pledge plays out in times of cyber threats in order to bolster confidence among NATO allies.
  6. Cyber Deterrence is Working” on July 30, 2014, Jason Healey argued in Defense News that the Internet is a fierce domain and conflicts are common between nations, but deterrence — or at least restraint — has kept a lid on the worst.
  7. Would NATO Go to War Over a Cyberattack?” on September 3, 2014, Klara Tothova Jordan wrote for the National Interest on the need for NATO nations to reexamine the threshold requirement for Article 5 application in response to cyberattacks.
  8. NATO Must Boost Its Cyber Defense Capabilities Now” on September 11, 2014, Klara Tothova Jordan wrote for Defense One, arguing that cyber defense capabilities are necessary for NATO to carry out its mission.
  9. In response to Sony hack, US should focus on China not North Korea” on December 19, 2014, Jason Healey wrote in the Christian Science Monitor that convincing Beijing to act is critical for any response to North Korea.
  10. Our Best Cyber Defense Is Silicon Valley, not the Pentagon” on December 23, 2014, Jason Healey wrote for New York Times' Room for Debate on why the private sector is the best defense against future cyberattacks.

Media Mentions
  1. NBC News quoted Jason Healey on January 27, 2014 on the revelation that the UK government tapped into data from social media sites including Facebook and YouTube.
  2. Breaking Defense quoted Jason Healey on February 5, 2014 on the US National Guard’s cyber warfare capabilities.
  3. Forbes named Jason Healey as one of the "Twenty Cyber Policy Experts to Follow on Twitter” on April 7, 2014.
  4. Week of April 10th - Jay, together with Axel Lehmann of Zurich, was interviewed by Bloomberg News on the content of the project on global aggregation of cyber risk.
  5. Bloomberg quoted Jason Healey on April 11, 2014 on the revelation that the NSA used the Heartbleed vulnerability for intelligence gathering.
  6. Bloomberg quoted Jason Healey on April 12, 2014 in a story on the NSA exploiting the Heartbleed bug, a story which forced a surprising and direct denial from NSA.
  7. Washington Post’s editorial board cited the Zurich report on April 13, 2014.
  8. Bloomberg quoted Jason Healey on April 14, 2014 on the new White House guidelines to limit the use of software flaws.
  9. Washington Post quoted Jason Healey on April 14, 2014 on the topic of Heartbleed.
  10. Wired quoted Jason Healey on April 15, 2014 on the White House announcement that certain government agencies have exploited software holes instead of disclosing them to vendors.
  11. Christian Science Monitor quoted Jason Healey on April 16, 2014 on the Zurich report.
  12. Politico, Computer Business Review, Business Insurance, Christian Science Monitor, and Inside Cybersecurity mentioned the Atlantic Council’s report “Beyond Data Breaches: Global Interconnections of Cyber Risk,” released in partnership with Zurich Insurance Group on April 16, 2014.
  13. US News published an op-ed on the Zurich report, co-authored by Jason Healey and Michael Kerner of Zurich Insurance Group.
  14. The Christian Science Monitor published a piece on April 16, 2014 entitled “Internet makes global economy vulnerable to Lehman-like crash, study says,” which focused on the Zurich report.
  15. World Risk and Insurance News featured a piece on the report as a lead up to the RIMS ERM conference 2014.
  16. Insurance News published its piece on Beyond Data Breaches on April 16, 2014.
  17. Inside Cybersecurity published a piece entitled “Report urges building resilience to future cyber shocks” on April 17 regarding the report.
  18. Politico ran a piece on the Zurich report entitled “The next Heartbleed?” on April 16, 2014.
  19. Inside Security quoted Jason Healey on April 17, 2014 on the Zurich report which emphasizes the need to bolster cybersecurity infrastructure in order to withstand future global shocks to the Internet.
  20. Risk.net published a piece on the report entitled “World risks ‘cyber Lehman’ crisis, Zurich report warns” on April 17, 2014.
  21. Jay Healey conducted radio interviews with KPCC, KCBS, and PRI’s To the Point with Warren Olney throughout the week of April 17.
  22. International Business Times published a report in their Technology section entitled “Zurich Insurance unveils seven deadly Cyber Risks” on April 22, 2014.
  23. The National Journal quoted Jason Healey on April 30, 2014 on the consequences of the NSA’s actions on Internet security.
  24. SCOR Global Risk Center released a publication calling attention to the Zurich report in April.
  25. Property Casualty 360 published a piece on the Beyond Data Breaches report on May 2, 2014.
  26. Risk and Insurance quoted Jason Healey on May 8, 2014 on how resiliency is crucial for withstanding inevitable Internet attacks.
  27. Insurance Business America released a piece on the seven aggregations of cyber risk on May 12, 2014.
  28. FA News released a piece on the report on the Zurich Launch on May 12, 2014.
  29. Daily Beast quoted Jason Healey on May 19, 2014 on the significance of US Justice Department charges against Chinese hackers.
  30. Inside Cybersecurity quoted Jason Healey on May 28, 2014 on the US cyber strategy.
  31. Bloomberg quoted Jason Healey on May 29, 2014 on an iSight Partners report about a recent, elaborate three-year effort by Iranian hackers to target US and allied government officials through social media.
  32. Christian Science Monitor quoted Jason Healey on June 5, 2014 on the impact of the intelligence breach conducted by Edward Snowden.
  33. Bloomberg published a sponsored article on July 2, 2014, on the report, citing “Seven Risks insights you don’t know- and that could save your business.”
  34. The Economist quoted Jason Healey on July 12, 2014 on how stronger Internet defenses can make cyberspace safer.
  35. SC Magazine quoted Jason Healey on August 7, 2014 on his ideas on “Saving Cyberspace.”
  36. Washington Post quoted Jason Healey on August 22, 2014 on what is needed to respond to the growing number of cyberattacks.
  37. Bloomberg Businessweek quoted Jason Healey on August 29, 2014 on the cyberattack on JPMorgan Chase & Co.
  38. Federal Computer Week named Jason Healey on October 1, 2014 one of “Four Cybersecurity Gurus to Follow on Twitter.”
  39. Bermuda Royal Gazette quoted Jason Healey on October 3, 2014 on Bermuda’s ability to protect itself from cyberattacks.
  40. Bermuda Royal Gazette quoted Jason Healey on October 6, 2014 on the threats to a free Internet.
  41. The Hill, Politico, PC World, AFP, findBiometrics, FierceGovernmentIT, FedScoop, FCW, Inside Cybersecurity, Planet Biometrics, ANI, Dark Reading, Biometric Update, and C-SPAN mentioned the Atlantic Council’s launch of the “Online Voting: Rewards and Risks” report published in partnership with McAfee, part of Intel Security, on October 8, 2014.
  42. Federal Computer Week quoted Jason Healey on October 24, 2014 on the document recently released by the Pentagon which outlined potential scenarios for confrontations in cyberspace.
  43. Breaking Defense quoted Jason Healey on November 7, 2014 on the effects of cyber deterrence.
  44. Politico quoted Jason Healey on November 28, 2014 on the likelihood that internet shoppers will have their data stolen during the holiday season.
  45. Bloomberg quoted Jason Healey on December 18, 2014 on the US announcement that North Korea was behind the cyberattack on Sony.
  46. The Financial Times quoted Jason Healey on December 18, 2014 on North Korea's role in the cyberattack against Sony.
  47. Politico quoted Jason Healey on December 19, 2014 on how the United States was likely to respond to the recent North Korean hack on Sony
  48. Mashable quoted Jason Healey on December 20, 2014, on how the United States should respond to North Korea's hack of Sony Pictures.
  49. The Hill quoted Jason Healey on December 20, 2014 on what the recent North Korean hack of Sony Pictures means for the future of cyber conflict.
  50. The Daily Beast quoted Jason Healey on December 20, 2014 on why a US response to the cyberattack on Sony should focus on China instead of North Korea.

Select Interviews and Broadcasts
  1. Magazine feature by SC Magazine on February 3, 2014.
  2. Broadcast on a possible cyber strike on Syria on February 25, 2014. Jason Healey spoke to CNN on whether the US had plans for cyber attack on the Syrian military.
  3. Jason Healey was interviewed on cyber conflict on March 17, 2014, by Emmy and Oscar award-winning documentary film-maker Alex Gibney as part of a new film that will be screened first at next year's Cannes film festival.
  4. Radio Broadcast "Healey on Heartbleed" on April 18, 2014, Jason Healey joins KCRW's To the Point to discuss the Heartbleed security vulnerability.
  5. Radio Broadcast on the future of cyberspace and what questions Congress should be asking on June 13, 2014. Jason Healey joins Federal News Radio's In Depth with Francis Rose.
  6. Radio Broadcast. Jason Healey joins Federal News Radio to discuss how deterrence in cyberspace has been possible for decades on August 4, 2014.
  7. Interviewed on Black Hat USA conference presentation on August 11, 2014. Jason Healey spoke with Bank Info Security on his ideas for saving cyberspace.
  8. Television interview on MSNBC's Rachel Maddow on December 18, 2014 to discuss what a proportional US response to the North Korean hack on Sony would look like.
  9. Television interview on CNN's Situation Room on December 18, 2014 to discuss the North Korean cyberattack on Sony.

Back to the top



 

RELATED CONTENT