A couple of Fridays ago, I was scheduled to have a call with former U.S. Rep. Jim Oberstar. I was shocked to learn the next morning that he had passed away in his sleep. I will always remember this about Jim Oberstar: whenever a change to our aviation system was proposed, the lens he would use to examine it was, we have the safest, most secure system in the world, and we need to keep it that way.
Increasing adoption of cyber insurance products and frequent cyber-related initiatives across the insurance and risk world has been incredibly positive. Yet, many companies that are not consumer-facing are struggling with the insurability of their increased exposure. The insurance industry needs to embrace this evolving reality.
Today marks the first anniversary of the Boston Marathon bombing. One year later, Boston is preparing for the marathon, and Dzhokhar Tsarnaev awaits trail on murder and terrorism charges. The country may be healing but the threat from domestic terrorism remains.
As a new DHS Secretary takes the helm, Security Debrief contributors came together for the First Chris Battle Homeland Security Colloquium. In the spirit of the late Chris Battle’s vision for debate and discussion on pressing homeland security matters, contributors weighed a series of important questions about DHS’ future.
The House Homeland Security Committee did something yesterday it has not done in the past several years, for anyone: it came out in full force for DHS Secretary Jeh Johnson’s maiden appearance before the committee. It was a positive performance by the Secretary, who showed himself adept at answering questions, even as his lawyer’s instincts kept him from falling into political traps.
On Thursday, February 27, 2014, Security Debrief and Catalyst Partners will host the First Annual Chris Battle Homeland Security Colloquium. Security Debrief’s expert contributors will come together to discuss and debate the current state of U.S. homeland security, DHS, and the threats and priorities the country will face in the year ahead.
By Gary Warner
This week, President Obama unveiled a set of guidelines issued by the National Institutes of Standards and Technology and a new public-private partnership program. While I join with others in applauding Mr. Obama’s creativity in making progress in protecting our nation’s cyber infrastructure, it is important to note what is and what is not being addressed by these guidelines. Where, for example, does the Target Breach fall?
There are a host of questions Congress ought to be asking about DHS’ use of Predator unmanned aerial vehicles to provide border surveillance. Congressional staff should know how the Predator’s cost stacks up against other alternative means of surveillance. Perhaps the problem is that decisions on what platform to use for border surveillance are not being made on the basis of risk-reward or cost-benefit.
News reports are trickling out about a decision by a Customs and Border Patrol Predator operator to send a multi-million dollar unmanned aerial vehicle into the Pacific Ocean when it became clear it could not make it back to its home base. This incident demands serious questions from Congress about the future of CBP’s Predator drone use.
Last Thursday, a chemical storage tank leaked about 7,500 gallons of 4-methylcyclohexane methanol into the Elk River, just one mile upstream from the West Virginia American Water plant. Thankfully, the water plant owner was forward thinking enough to invest in preparedness before an immediate need arose. This undoubtedly helped the plant respond to the chemical leak. Something tells me there’s a lesson there.