Obama Advises Trump To Train 100,000 Hackers

The Obama Administration has recommended that incoming President Donald Trump execute a comprehensive cybersecurity strategy, including the training of 100,000 white hats.

A special Commission has delivered a report outlining cybersecurity as one of the greatest challenges that the US faces, as reflected in President Obama’s 2017 budget, which calls for a more than 35%  increase in federal cybersecurity resources.

The incoming Trump administration is first being advised to train 100,000 hackers by 2020 as part of a "national cybersecurity workforce program" that would deliver experts to businesses and government agencies across the country, addressing the much-publicized workforce skills shortage.

The Commission also recommends establishing international norms for hacking, a kind of Geneva Convention for ethics in cyberwar; and to establish a precedent for product liability when internet-connected devices have little or no security. 

“Internet of Things (IoT) devices are the current "it thing" in cybersecurity, as there is no true standard for developing, deploying or securing the software which runs these kinds of devices," said Nathan Wenzler, principal security architect at AsTech Consulting, via email. 

"As they become more and more ubiquitous, IoT devices present a huge platform for cybercriminals and hacktivists to target, compromise and use for whatever purpose they see fit. Putting an emphasis on building secure IoT platforms and increasing R&D for developing operating systems and related software products in a secure manner from the start is a hugely important area of Information Security that extends well beyond IoT devices alone. It's commonly said that, when it comes to security, it's ‘better to bake it in than bolt it on.’ ”

Obama said that he has asked the Commission, which included ex-NSA director Keith Alexander, MasterCard CEO Ajay Banga, plus other notable business executives, lawyers and academics, to brief the president-elect’s transition team at its earliest opportunity. 

The Trump administration is also being advised to issue a national cybersecurity strategy in the first six months of his term, and to appoint a new cyber-advisor and cyber-ambassador.
 
Obama said, “investing in human capital, education, and the productivity of the cybersecurity workforce will ensure that this country’s best and brightest are helping us stay ahead of the cybersecurity curve. 

Continuing to prioritise and coordinate cybersecurity efforts across the federal government will ensure that this critical challenge remains a top national security priority. And furthering the promotion of international norms of responsible state behavior will ensure that the global community is able to confront the ever-evolving threats we face.”

Infosecurity Magazine:                Donald Trump Has A Plan for CyberWar:

 

« US & Russia Relations: It’s A New Cold War
How Russian Cyber Power Attacked The US »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Cyber Defense Labs

Cyber Defense Labs

Cyber Defense Labs helps companies identify, mitigate and reduce risk as a trusted, reliable partner for cyber risk management.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

Darkscope

Darkscope

Darkscope is an award-winning personalised cyber intelligence service provider. Our cutting-edge AI and Deep Artificial Neural Networks lead the world of cyber intelligence solutions.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

M7 Services

M7 Services

M7 Services are a comprehensive Managed Services Provider (MSP) with a focus on delivering cutting-edge information technology solutions and unparalleled customer service.