Governance & Risk Management , Information Sharing , Next-Generation Technologies & Secure Development

Step One: Admitting We Have a Cybersecurity Problem

Reitinger of Global Cyber Alliance on Tackling Risk Management

Phil Reitinger, CEO of the Global Cyber Alliance, a group he describes as a "coalition of the angry," describes how it has channeled this anger into action.

See Also: Email Security from the Trenches

In a video interview at RSA Conference 2017, Reitinger also:

  • Discusses why he believes the U.S. is in step one of a 12-step cybersecurity program;
  • Sizes up progress toward measuring systemic risk;
  • Reviews the alliance's early initiatives.

Before being tapped as Global Cyber Alliance's president and CEO last year, Reitinger served as deputy undersecretary for cybersecurity at the Department of Homeland Security. He also served as director of DHS's National Cybersecurity Center, leading the department's efforts to reduce risks across cyber and physical infrastructures and helping secure federal networks and systems by collecting, analyzing, integrating and sharing information among interagency partners. Reitinger also previously served as chief trustworthy infrastructure strategist at Microsoft and executive director for the Defense Department's Cyber Crime Center. After leaving government service, Sony recruited him as its first CISO in the wake of a massive security breach of its PlayStation gaming system.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.