Jason Healey, cybersecurity expert, joins Ann Johnson to discuss the evolution of cybersecurity, the importance of frameworks like NIST and the cyber kill chain, and the role of diplomacy in addressing cyber threats. They also highlight the benefits of cloud technology and building alliances to defend against cyber-attacks.
Understanding the significance of integrating security into core designs from historical reports.
Utilizing soft power strategies like alliances and global perception to combat cyber threats effectively.
Deep dives
Jason Healy's Journey into Cybersecurity and National Security
Jason Healy's path into the cybersecurity realm began in the mid-1990s through signals intelligence, drawn by a fascination with national security and technology. Being part of the early edge of cyber threat intelligence, he delved into predicting cyber attacks using an intelligence mindset. He played a pivotal role in setting up the first joint cyber command in 1998. He highlights the importance of leveraging intelligence and understanding potential cyber threats.
Evolution of Cybersecurity: From Historical Reports to Current Challenges
Jason Healy delves into historical cybersecurity reports like the Wear and Anderson Reports, dating back to the 1970s, which fundamentally shaped the field. These reports highlighted the challenges in securing open environments and emphasized the significance of integrating security into core designs. Despite decades of innovation and investment, attackers often maintain an advantage over defenders, prompting a focus on improving defense strategies.
Leveraging Soft Power in Cybersecurity: Lessons from Estonia and Ukraine
Discussing the concept of soft power in cybersecurity, Healy explores how countries like Estonia and Ukraine used their alliances and global perception to combat cyber threats effectively. By mobilizing support from allies and fostering trust, these nations mitigated cyber attacks and gained substantial assistance during critical times. The podcast examines the importance of garnering support and influencing behavior through soft power strategies in the cybersecurity domain.
Financial Stability and Cyber Risk Management: A Macro Approach
Healy collaborates with Trish Mosser to address cyber risk implications on financial stability, emphasizing the macroeconomic viewpoint. Delving into the Federal Reserve Bank of New York's research on supply chain impacts post-NotPetya, Healy underscores the importance of system-wide resilience. By bridging the gap between micro and macro approaches, the discussion shifts towards collective industry efforts to safeguard financial systems amidst evolving cyber threats.
Jason Healey, founding scholar and director for cyber efforts at Columbia's School of International and Public Affairs join’s Ann on this week's episode of Afternoon Cyber Tea. Jason is a seasoned speaker, analyst, and author, boasting extensive expertise in cybersecurity and risk management across diverse sectors including think tanks, finance, the White House, military, intelligence, and academia. Jason highlights the importance of frameworks for understanding complex issues like AI's role in cybersecurity and shares his reasons for optimism in the field, such as advancements in secure design and the potential benefits of cloud technology. Jason and Ann also discuss the evolution of cybersecurity, the role of diplomacy in addressing cyber threats, and the importance of building alliances in defending against cyber-attacks.