Also in this playlist...
This transcript is automatically generated
Let's talk more about cyber attacks how prevalent they are and what -- US is doing about them with an expert.
-- -- -- He's a former official with the national security agencies now founder and CEO of a private cyber security firm -- started last year.
-- thanks for being thank you we'll tell me first of all what you did she had an asset.
-- -- I was there for about twelve years -- cyber security around.
Mostly on the offensive in defense -- cyber operations.
So I -- look at this Reza France's deputy chief of integrated cyber operations within the information assurance directorate so English.
You essentially were running.
Red team blue team kind of -- and figure out what worked and what didn't on cyber offense and defense.
It's -- red team was looking out mostly.
And testing penetration testing on US government -- works whose team was instant response and vulnerability assessments and then also the hunting division.
Which was looking for advanced threats on US government numbers for the average person out there.
How serious is the cyber of threats that the US now faces both.
For private companies and for the US captain -- it's actually larger for the private companies.
Where that's where most of the administrations -- actually happening answer a lot of the incidents are taking place right now.
He's the US good at defending.
There's room for improvement overall were fairly good -- US government.
Are we vulnerable.
You know a year -- horror stories about what could happen about.
You know the next threat could be.
Nation states that launches an attack that takes over something that.
Means that realistic whether or not -- realistic there are vulnerabilities there and there are there is prevalent threat.
Tom I think particularly on the pride and industry side -- -- there's a huge threat what do they take the types of things most of these organizations are targeting is our intellectual property.
-- in some cases for for example criminal organizations from either within the US -- outside the US are looking at you know private information.
-- that's -- -- individual.
In the country there's a new study out there we just heard a report from Catherine Herridge about this Virginia based cyber security firm.
Charging that the Chinese.
And through their army have essentially set up this one building and all comes back to this one place they say.
Take a listen to.
The head of this firm Kevin -- It didn't take much but one and one together that building that we found.
Harvard the group.
And all the activities coming from that region we know where the building -- but it -- -- I can't tell you what's inside the building.
I think that's something I didn't get us past the front door but inside it's really our best -- we have a tall Storey building maybe it's hundreds of folks maybe as thousands.
What I can tell you is its output what they're responsible forced thousands of companies being compromised.
And it's a sustained effort to this has been -- on -- seven years.
So -- knowledge of that Chinese activity.
I would say that -- is actually much larger than just countries that are mentioned in this report.
There's a lot of different organizations whether it's our nation state actors -- -- -- organizations and also.
Politically motivated -- organizations that are not necessarily tied to -- nation state actors.
But the reality of the Chinese investing in one building in their and their army -- To having this secret unit.
If you if you could buy that there's a lot of threats out there it's a broad ranging wide swathe of organizations that are targeting.
US intellectual property and I know it's it's tough to talk specifics -- some of this stuff gets in did.
Classified areas but the threats.
He's the bombardment constant comment on an average day.
What are -- what are guys seeing it NSA at these.
At these sites that we're trying to defend against from a private industries.
And point looking at that.
How we're seeing there's thousands of different incidents that are taking place each day how you put up I network at any given point it's gonna get somebody's in -- trying to break into it.
In some cases that's Blu-ray have low -- hackers and another case is a -- and advanced threats toward him.
Need to do well let's save outside of the US government to actually -- -- take a look at on their own security posture they need to raise their own.
Investment in their own security rosters right now it's not terribly high.
On the list particularly for medium and smaller companies.
Security from a network standpoint is not really even looked that.
Thompson they need to look at security they need to take it seriously and then they also need to take a look at the threat read papers like what I was put out.
Recently that the president has signed this directive -- to share information it's kind of one step.
Congress has not managed to -- fully on comprehensive bill as you know.
And it seems like it -- a little bit over privacy concerns are are you concerned about them.
There are some issues there there's there are some important warns that actually need to be debated and talked about but from a private sector proper perspective.
A lot of the different security issues can be handled in house within their own power -- station's current -- thanks a lot thank you.
Filter by section