Online Safety Community

Joe Stuntz on cybersecurity and One World Identity

Joe Stuntz was most recently the Policy Lead for the White House Office of Management and Budget (OMB) Cyber and National Security unit, now he works with One World Identity. We spoke with Stuntz about cybersecurity threats and solutions.

In October 2017, One World Identity, an independent strategy and research company focused on identity, named Joe Stuntz, as Vice President of Cybersecurity. Stuntz was recently served the Director of Program Performance for the White House Office of Management and Budget (OMB) Cyber and National Security unit. During his time at the White House, Stuntz helped develop the following cybersecurity initiatives: Executive Order 13800, The Cybersecurity National Action Plan (CNAP) and The Cybersecurity Strategy and Implementation Plan (CSIP). To find out what these initiatives were about, the on going threat of cyberattacks and the focus of One World Identity, we spoke with the technology expert.

Digital Journal How big is the cybersecurity risk facing developed economies?

Joe Stuntz: Because developed economies have connected more of their infrastructure and systems to the Internet, they are at a large risk of attack. In many cases what allows the economies to make progress and grow through the use of new technology and people connecting is also increasing their risk. Because connectedness is only going to increase with the introduction and adoption of smart devices known as the Internet of things, the risk will also increase.

DJ: Which types of risks do you think are the most significant?Stuntz: Outside of the very very unlikely catastrophic cyber attack that has physical impacts and causes loss of life, the risks I worry about are to the financial sector. If trust, confidence, and safety in the markets disappear, an economy could collapse and because of the interconnectedness of economies today it would be a global crisis. Also it is important to think about the definition of cyber security risk and think beyond the typical image of a hacker in a hoodie in a dark basement with a glowing keyboard. This risk includes lots of data stewardship issues where companies or countries use data to target fraud or misinformation. The advances in technology have made new types of commerce possible, but are also being used to create instability. Cyber hygiene is still critical and the fundamentals still address many of the common issues, but it should be part of a larger trust and safety strategy around managing data.

DJ: Are these risks greater from different countries?Stuntz: Each country has a different level of maturity in terms of cybersecurity, and a different number and type of threats. As mentioned above, some countries are not as technologically advanced which may be limiting their economy, but also reduces their cyber risk. Cyber attacks can also come as a reaction to international relations, political positions, or non-cyber attacks or sanctions. The focus should be for countries to understand the broader context and see cyber as a tool that a country or actor can use to accomplish broader goals.

For continue this http://snip.ly/ixn7f

Views: 31

Comment

You need to be a member of Online Safety Community to add comments!

Join Online Safety Community

Take our poll!

Take our poll!

Latest Activity

Manavalan posted an event
Thumbnail

Nebosh course in Chennai at Chennai

July 17, 2018 at 6pm to July 31, 2018 at 7pm
2 hours ago
Roger Steven posted events
3 hours ago
Training Doyens posted an event
Thumbnail

Reward and Recognition for Small Companies: How to Boost Productivity And Keep Your Employees Motivated at 26468 E Walker Dr, Aurora, Colorado 80016

August 9, 2018 from 1pm to 2pm
OVERVIEWThis webinar will cover the various components and steps of effective reward and recognition in small companies. We will cover some theories of motivation; the neurophysiology of recognition and its effect on productivity; the timing of recognition who should do the recognition; and methods of…See More
3 hours ago
Profile IconAlice Denny, Joseph Adami and Traininng.com LLC joined Online Safety Community
Friday

Forum

5 TECHNOLOGY-BASED LONE WORKER SAFETY SOLUTIONS

ABOUT 75% OF EMPLOYEES IN NORTH AMERICA ARE MOBILE WORKERS. ADVANCES IN COMMUNICATIONS TECHNOLOGY MEANS THESE WORKERS CAN WORK ANYWHERE AT ANY TIME. THESE NEW TECHNOLOGIES ALSO MEAN THESE MOBILE…Continue

Tags: Solutions, People, IoT, Monitoring, Remote

Started by Jen McDade May 31.

Road Safety Solutions 14 Replies

The Road Safety Signs ,Barriers,Humps,Hazard Markers and Visual Warnings are some of the important marks to be observed. Signs such as "keep left",stop, "give way" should not be casually treated.…Continue

Tags: safety, gear, wear, Equipment, &

Started by Enna Henry. Last reply by Jen McDade May 31.

Remote Monitoring

Get "Safe Assets and Sound Productivity" Through Remote Monitoring.Visit:…Continue

Tags: Solutions, People, IoT, Monitoring, Remote

Started by Jen McDade May 23.

Python Condition Objects Tutorial in 2018 1 Reply

If you have knowledge of other programming languages, then you would know the importance of conditional statements. Conditional statements are required for taking decisions. Whenever we operate the…Continue

Tags: course, certification, training, languages, programming

Started by Elena Lauren. Last reply by Jim Chesters May 15.

Power BI Visualization Types

Visualizations in Power BI displays the visual insights from a data. In power bi service a visual can be pinned from reports to create dashboards. Visuals are used in reports.List of visualizations…Continue

Tags: COURSE, TRAINING, BI, POWER

Started by Azharuddin May 15.

Badge

Loading…

© 2018   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service