{"id":6602,"date":"2014-09-04T06:00:03","date_gmt":"2014-09-04T13:00:03","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6602"},"modified":"2014-09-03T13:08:54","modified_gmt":"2014-09-03T20:08:54","slug":"government-private-industry-partners-cybersecurity","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/09\/government-private-industry-partners-cybersecurity\/","title":{"rendered":"Government and Private Industry: Partners in Cybersecurity"},"content":{"rendered":"<p>Recently I had the pleasure of participating in <a href=\"http:\/\/news.stanford.edu\/news\/2014\/august\/cybersecurity-boot-camp-081914.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Stanford University\u2019s inaugural Cybersecurity Boot Camp<\/a>. Attendees included two dozen senior congressional staffers, Silicon Valley business leaders and members of academia. We gathered to further the discussion on cybersecurity threats facing the United States and to arm our congressional colleagues with perspectives important for legislation to better protect our networks and infrastructure.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6605 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Raj-Shah-500x331.jpg\" alt=\"Raj Shah\" width=\"500\" height=\"331\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Raj-Shah-500x331.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Raj-Shah-230x152.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Raj-Shah-452x300.jpg 452w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Raj-Shah-60x40.jpg 60w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: xx-small;\">Raj Shah moderates a panel discussion at Stanford\u2019s Cybersecurity Boot Camp,\u00a0while Ellen Richey, executive vice president and chief risk officer at Visa, looks on.\u00a0Photo by Ron Searcey<\/span><\/p>\n<p>I moderated a panel discussion that covered a variety of issues related to cybersecurity and featured panelists with a wealth of information to share, including:<!--more--><\/p>\n<ul>\n<li><a href=\"https:\/\/www.linkedin.com\/pub\/ellen-richey\/7\/b51\/69a\" rel=\"nofollow,noopener\"  target=\"_blank\">Ellen Richey<\/a>, executive vice president and chief enterprise risk officer at Visa<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/en-us\/news\/presskits\/security\/docs\/charneysbio.docx\" rel=\"nofollow,noopener\"  target=\"_blank\">Scott Charney<\/a>, corporate vice president for Trustworthy Computing at Microsoft<\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/profile\/view?id=26230620\" rel=\"nofollow,noopener\"  target=\"_blank\">Melody Hildebrant<\/a>, global head of cybersecurity at Palantir<\/li>\n<li><a href=\"http:\/\/www.usvp.com\/our_team\/senior_advisor\/david_liddle\" rel=\"nofollow,noopener\"  target=\"_blank\">David Liddle<\/a>, venture partner at U.S. Venture Partners<\/li>\n<\/ul>\n<p>Some of the key takeaways from the discussion included:<\/p>\n<ul>\n<li>The fallout from the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" rel=\"nofollow,noopener\"  target=\"_blank\">Snowden<\/a> affair made some companies wary of working closely with the U.S. government out of fear it could alienate foreign customers and impact their international lines of business.<\/li>\n<li>Security companies don\u2019t see the world in terms of nation states; they see customers. And the best policy when working with customers is mutual trust, transparency and a respect of privacy.<\/li>\n<li>While relations between government, law enforcement and private industry are improving, fellow companies are often still the best resources for threat intelligence. The financial sector in particular was cited as having strong, though in some cases informal, mechanisms in place for sharing valuable intel on APT and malware.<\/li>\n<li>While China is viewed as a significant threat to private sector intellectual property, the opportunity of the Chinese market is too large for companies to ignore. In some ways, dealing with cybersecurity threats from China has become just another cost of doing business.<\/li>\n<li>Private industry should remember that the U.S. government has to make some very difficult decisions when it comes to investigating (and sometimes <a href=\"http:\/\/www.justice.gov\/opa\/pr\/2014\/May\/14-ag-528.html\" rel=\"nofollow,noopener\"  target=\"_blank\">prosecuting<\/a>) nation states involved in cyberattacks. The State Department is often times trying to build stronger political and economic influence with these countries, and these efforts can be severely compromised by U.S. actions against cyberattackers.<\/li>\n<\/ul>\n<p>While there are significant challenges that need to be addressed in order for U.S. businesses and government agencies to improve the country\u2019s cybersecurity posture, it was exciting to see these business and government decision makers come together and listen to each another. The desire to work together was palpable and I look forward to attending future cybersecurity boot camps.<\/p>\n<p>I had an opportunity to give a quick summary of why this event was so important, which you can see <a href=\"http:\/\/vimeo.com\/103970939\" rel=\"nofollow,noopener\"  target=\"_blank\">here<\/a>.<\/p>\n<p>Many thanks to Stanford's\u00a0<a href=\"http:\/\/cisac.stanford.edu\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Center for International Security and Cooperation<\/a>\u00a0and the <a href=\"http:\/\/www.hoover.org\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Hoover Institution<\/a>\u00a0for organizing the event.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently I had the pleasure of participating in Stanford University\u2019s inaugural Cybersecurity Boot Camp. Attendees included two dozen senior congressional staffers, Silicon Valley business leaders and members of academia. We gathered to &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133,484],"tags":[650,649],"coauthors":[],"class_list":["post-6602","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","category-government","tag-cybersecurity-boot-camp","tag-stanford-university"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6602"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6602\/revisions"}],"predecessor-version":[{"id":6609,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6602\/revisions\/6609"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6602"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}