Obama Advises Trump To Train 100,000 Hackers

The Obama Administration has recommended that incoming President Donald Trump execute a comprehensive cybersecurity strategy, including the training of 100,000 white hats.

A special Commission has delivered a report outlining cybersecurity as one of the greatest challenges that the US faces, as reflected in President Obama’s 2017 budget, which calls for a more than 35%  increase in federal cybersecurity resources.

The incoming Trump administration is first being advised to train 100,000 hackers by 2020 as part of a "national cybersecurity workforce program" that would deliver experts to businesses and government agencies across the country, addressing the much-publicized workforce skills shortage.

The Commission also recommends establishing international norms for hacking, a kind of Geneva Convention for ethics in cyberwar; and to establish a precedent for product liability when internet-connected devices have little or no security. 

“Internet of Things (IoT) devices are the current "it thing" in cybersecurity, as there is no true standard for developing, deploying or securing the software which runs these kinds of devices," said Nathan Wenzler, principal security architect at AsTech Consulting, via email. 

"As they become more and more ubiquitous, IoT devices present a huge platform for cybercriminals and hacktivists to target, compromise and use for whatever purpose they see fit. Putting an emphasis on building secure IoT platforms and increasing R&D for developing operating systems and related software products in a secure manner from the start is a hugely important area of Information Security that extends well beyond IoT devices alone. It's commonly said that, when it comes to security, it's ‘better to bake it in than bolt it on.’ ”

Obama said that he has asked the Commission, which included ex-NSA director Keith Alexander, MasterCard CEO Ajay Banga, plus other notable business executives, lawyers and academics, to brief the president-elect’s transition team at its earliest opportunity. 

The Trump administration is also being advised to issue a national cybersecurity strategy in the first six months of his term, and to appoint a new cyber-advisor and cyber-ambassador.
 
Obama said, “investing in human capital, education, and the productivity of the cybersecurity workforce will ensure that this country’s best and brightest are helping us stay ahead of the cybersecurity curve. 

Continuing to prioritise and coordinate cybersecurity efforts across the federal government will ensure that this critical challenge remains a top national security priority. And furthering the promotion of international norms of responsible state behavior will ensure that the global community is able to confront the ever-evolving threats we face.”

Infosecurity Magazine:                Donald Trump Has A Plan for CyberWar:

 

« US & Russia Relations: It’s A New Cold War
How Russian Cyber Power Attacked The US »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.