Illumio Blog
Find me on:
January 4, 2019

Keep the Faith: America’s GDPR Will Come

Head of Cybersecurity Strategy

Jonathan is a seasoned cybersecurity strategist. He's been at the forefront of international security policy and now leads Illumio's public cybersecurity policy engagements and research.

This article was originally published on nextgov.com

For the first time in years, a national data regulation and privacy law could soon become a reality in the United States. Why is this happening now, and what are the right steps forward?

Read more »

cybersecurity

December 14, 2018

See the World. Then Secure It.

Head of Cybersecurity Strategy

Jonathan is a seasoned cybersecurity strategist. He's been at the forefront of international security policy and now leads Illumio's public cybersecurity policy engagements and research.

There's a print shop and wine bar in my neighborhood called Two Mile Wines and on the walls they hang exquisite printed metal maps of the San Francisco Bay. Silver print, brass-colored maps from the 20th century. They immediately draw you in.

The human mind likes to visualize a landscape to better understand the nature of the world. Maps give you a sense of place; only through a map can you see yourself in relation to the whole physical world.

Read more »

cybersecurity

November 30, 2018

China Is the Top Long-Term Threat in Cyberspace

Head of Cybersecurity Strategy

Jonathan is a seasoned cybersecurity strategist. He's been at the forefront of international security policy and now leads Illumio's public cybersecurity policy engagements and research.

This article was originally published on nextgov.com

China is rising in economic and military might and presents the greatest long-term challenge to U.S. national interests – including in cyberspace. Three weeks ago, the current U.S. national security advisor, John Bolton, for the first time publicly attributed the hack of the Office of Personnel Management to China.

China is investing in military cyberspace forces and today’s cyber theft could be tomorrow’s influence operation or disruptive attack on infrastructure. So what should the United States do to prepare for the rise of Chinese power in cyberspace?

Read more »

cybersecurity

November 13, 2018

What Happens When the U.S. Starts to ‘Defend Forward’ in Cyberspace?

Head of Cybersecurity Strategy

Jonathan is a seasoned cybersecurity strategist. He's been at the forefront of international security policy and now leads Illumio's public cybersecurity policy engagements and research.

This article was originally published on defenseone.com

A couple of weeks ago, the U.S. Defense Department took the first step in executing its new “defend forward” doctrine in cyberspace. The Pentagon telegraphed this step in its new cyber strategy, which told Russia, China, and others that if they continue to conduct cyberspace operations against U.S. interests, the U.S. will push back by targeting their military cyberspace infrastructure and disrupting their operations.

Read more »

cybersecurity

November 5, 2018

[Key Takeaways] Assume Breach: Best Practices in Cyber Resilience

Head of Cybersecurity Strategy

Jonathan is a seasoned cybersecurity strategist. He's been at the forefront of international security policy and now leads Illumio's public cybersecurity policy engagements and research.

It is not a question of if but when an organization or an individual will be breached in cyberspace. If you believe that, you have taken the most important cognitive step – you are prepared to “assume breach” and build resilience to withstand a cyberattack.

But if you assume breach, what does it mean for how you think about security investments in people, processes, and technology? More importantly, what strategies should your organization employ to become secure beyond breach? On October 24, 2018, Illumio convened a group of cybersecurity strategy and technology leaders in Washington, D.C., to discuss the assumption of breach and identify best practices in cyber resilience. 

Below is a summary of key findings from the day. For those interested in hearing all these smart people talk, stay tuned for the videos. 

Read more »

cybersecurity