Obama Advises Trump To Train 100,000 Hackers

The Obama Administration has recommended that incoming President Donald Trump execute a comprehensive cybersecurity strategy, including the training of 100,000 white hats.

A special Commission has delivered a report outlining cybersecurity as one of the greatest challenges that the US faces, as reflected in President Obama’s 2017 budget, which calls for a more than 35%  increase in federal cybersecurity resources.

The incoming Trump administration is first being advised to train 100,000 hackers by 2020 as part of a "national cybersecurity workforce program" that would deliver experts to businesses and government agencies across the country, addressing the much-publicized workforce skills shortage.

The Commission also recommends establishing international norms for hacking, a kind of Geneva Convention for ethics in cyberwar; and to establish a precedent for product liability when internet-connected devices have little or no security. 

“Internet of Things (IoT) devices are the current "it thing" in cybersecurity, as there is no true standard for developing, deploying or securing the software which runs these kinds of devices," said Nathan Wenzler, principal security architect at AsTech Consulting, via email. 

"As they become more and more ubiquitous, IoT devices present a huge platform for cybercriminals and hacktivists to target, compromise and use for whatever purpose they see fit. Putting an emphasis on building secure IoT platforms and increasing R&D for developing operating systems and related software products in a secure manner from the start is a hugely important area of Information Security that extends well beyond IoT devices alone. It's commonly said that, when it comes to security, it's ‘better to bake it in than bolt it on.’ ”

Obama said that he has asked the Commission, which included ex-NSA director Keith Alexander, MasterCard CEO Ajay Banga, plus other notable business executives, lawyers and academics, to brief the president-elect’s transition team at its earliest opportunity. 

The Trump administration is also being advised to issue a national cybersecurity strategy in the first six months of his term, and to appoint a new cyber-advisor and cyber-ambassador.
 
Obama said, “investing in human capital, education, and the productivity of the cybersecurity workforce will ensure that this country’s best and brightest are helping us stay ahead of the cybersecurity curve. 

Continuing to prioritise and coordinate cybersecurity efforts across the federal government will ensure that this critical challenge remains a top national security priority. And furthering the promotion of international norms of responsible state behavior will ensure that the global community is able to confront the ever-evolving threats we face.”

Infosecurity Magazine:                Donald Trump Has A Plan for CyberWar:

 

« US & Russia Relations: It’s A New Cold War
How Russian Cyber Power Attacked The US »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.