1 00:00:03,200 --> 00:00:06,560 Speaker 1: Global business news twenty four hours a day at Bloomberg 2 00:00:06,600 --> 00:00:09,680 Speaker 1: dot com, the Radio plus Mobile Act and on your radio. 3 00:00:09,960 --> 00:00:14,200 Speaker 1: This is a Bloomberg Business Flash from Bloomberg World Headquarters. 4 00:00:14,240 --> 00:00:18,000 Speaker 1: I'm Charlie Pellet. The Dow, the SMP, NEZDAC all advancing 5 00:00:18,120 --> 00:00:21,880 Speaker 1: stocks posting the strongest to day rally in nearly three months, 6 00:00:22,280 --> 00:00:25,560 Speaker 1: as signs of a stronger economy spur speculation it can 7 00:00:25,680 --> 00:00:29,480 Speaker 1: withstand higher interest rates. The SMP five hundred indecks up 8 00:00:29,520 --> 00:00:32,800 Speaker 1: fourteen to two thousand ninety again of seven tenths of 9 00:00:32,880 --> 00:00:36,280 Speaker 1: one percent, as stack up thirty three points again also 10 00:00:36,320 --> 00:00:39,279 Speaker 1: of seven tenths of one percent down. Industrials up one 11 00:00:39,720 --> 00:00:42,479 Speaker 1: forty five points again of eight tenths of one percent. 12 00:00:42,920 --> 00:00:46,400 Speaker 1: Gold down four to twelve twenty four a dropped, There 13 00:00:46,360 --> 00:00:49,280 Speaker 1: are four tenths of one percent. Crude oil closing it 14 00:00:49,360 --> 00:00:52,040 Speaker 1: on fifty dollars of arrow forty nine sixty eight on 15 00:00:52,120 --> 00:00:55,200 Speaker 1: West Texas Intermediate of a dollar six again there of 16 00:00:55,280 --> 00:00:58,640 Speaker 1: two point two percent. I'm Charlie Pellet, and that's a 17 00:00:58,680 --> 00:01:06,119 Speaker 1: Bloomberg Business Flash. Sure taking stock with Kathleen on Bloomberg Radio. 18 00:01:06,640 --> 00:01:10,120 Speaker 1: We're broadcasting line today from the Bloomberg Breakaway Sonnet. It's 19 00:01:10,160 --> 00:01:14,240 Speaker 1: a two day conference bringing together top executives leading high 20 00:01:14,480 --> 00:01:17,240 Speaker 1: growth companies. But no matter how fast your company grows 21 00:01:17,319 --> 00:01:19,880 Speaker 1: or how top level you are, something that you have 22 00:01:19,959 --> 00:01:23,120 Speaker 1: to keep running to catch up with is cyber security. 23 00:01:23,200 --> 00:01:25,560 Speaker 1: And someone who is intimately involved with that now is 24 00:01:25,720 --> 00:01:28,600 Speaker 1: joining us from the Bloomberg Breakaway Summit. Are that Heart. 25 00:01:28,840 --> 00:01:33,040 Speaker 1: She's chief Information Security Officer at the FBI. She's usually 26 00:01:33,319 --> 00:01:35,200 Speaker 1: in Washington, d C. But she's here in New York 27 00:01:35,240 --> 00:01:37,760 Speaker 1: City fest today. Welcome, thank you, thank you for having me. 28 00:01:37,920 --> 00:01:41,480 Speaker 1: So first of all, what does the chief Information Security 29 00:01:41,480 --> 00:01:44,800 Speaker 1: Officer of the Federal Bureau of Investigation do? What do 30 00:01:44,840 --> 00:01:47,320 Speaker 1: you in charge up? We make sure that the Federal 31 00:01:47,360 --> 00:01:51,840 Speaker 1: Bureau of Investigations data and capabilit and electronic capabilities are secure. 32 00:01:52,280 --> 00:01:55,560 Speaker 1: So make sure that the cybersecurity protections are in place, 33 00:01:55,680 --> 00:01:58,760 Speaker 1: that we have the right defensive posture. And we we 34 00:01:58,840 --> 00:02:01,480 Speaker 1: both look at the extra and the insider threat. So 35 00:02:01,520 --> 00:02:03,720 Speaker 1: we make sure that we have protections and we are 36 00:02:03,760 --> 00:02:07,080 Speaker 1: guarding the bureaus information. And I would imagine that a 37 00:02:07,120 --> 00:02:10,480 Speaker 1: lot of people, bad guys, bad bad people would like 38 00:02:10,560 --> 00:02:13,840 Speaker 1: to hack you if they could, They would They try 39 00:02:13,880 --> 00:02:17,680 Speaker 1: often every day it's like, yes, we we have a 40 00:02:17,760 --> 00:02:20,840 Speaker 1: very aggressive approach to cybersecurity at the Bureau, and we 41 00:02:21,080 --> 00:02:23,520 Speaker 1: definitely are on the defense all the time, but we 42 00:02:23,600 --> 00:02:27,440 Speaker 1: also make sure that we are enabling the mission also. 43 00:02:27,800 --> 00:02:30,000 Speaker 1: This is a critical component. A lot of times people 44 00:02:30,000 --> 00:02:32,399 Speaker 1: talk in terms of cybersecurity, it's like, oh, well, that's 45 00:02:32,440 --> 00:02:34,600 Speaker 1: getting in the way. We can't get in the way. 46 00:02:34,639 --> 00:02:36,840 Speaker 1: We have to make sure that the mission itself is 47 00:02:36,960 --> 00:02:39,400 Speaker 1: enabled all the time, because that's more critical than the 48 00:02:39,560 --> 00:02:43,480 Speaker 1: the the mission be enabled by security with the right 49 00:02:43,560 --> 00:02:47,480 Speaker 1: levels of security in place. It's security from many of 50 00:02:47,520 --> 00:02:50,240 Speaker 1: the people you talk to, an after effect in other 51 00:02:50,280 --> 00:02:53,560 Speaker 1: which something bad happens and then they go back and 52 00:02:53,600 --> 00:02:56,280 Speaker 1: they try to, you know, put the toothpaste back in 53 00:02:56,320 --> 00:03:00,280 Speaker 1: the tube. It just it doesn't work. Can't start there, correct, Well, 54 00:03:00,320 --> 00:03:03,120 Speaker 1: you have to start somewhere, so better there than not 55 00:03:03,200 --> 00:03:05,519 Speaker 1: starting at all. It is hard to put that genie 56 00:03:05,520 --> 00:03:07,560 Speaker 1: back in the bottle or the toothpaste back in the tube, 57 00:03:07,560 --> 00:03:09,320 Speaker 1: but you really do need to go down the path. 58 00:03:09,440 --> 00:03:12,760 Speaker 1: So after an incident and from an incident response perspective, again, 59 00:03:12,800 --> 00:03:14,920 Speaker 1: I'm on the defense side of the bureau. I'm not 60 00:03:15,000 --> 00:03:17,200 Speaker 1: on the defense. I'm not in the cyber division, which 61 00:03:17,240 --> 00:03:21,440 Speaker 1: does the investigation of external threats. But nevertheless, everybody's in 62 00:03:21,480 --> 00:03:24,400 Speaker 1: the same position. We have to be able to react 63 00:03:24,440 --> 00:03:27,480 Speaker 1: to incidents and make sure that so we don't have 64 00:03:27,520 --> 00:03:29,639 Speaker 1: all the toothpaste out of the bottle out of the tube, 65 00:03:29,840 --> 00:03:32,000 Speaker 1: so we can contain the breach. We can make sure 66 00:03:32,040 --> 00:03:34,320 Speaker 1: that we have as low impact as possible, and that 67 00:03:34,400 --> 00:03:37,440 Speaker 1: also means finding it quickly, so it's not just a 68 00:03:37,480 --> 00:03:40,400 Speaker 1: matter of um, okay, well that would happened a long 69 00:03:40,440 --> 00:03:42,480 Speaker 1: time ago, but making sure that you have the right 70 00:03:42,800 --> 00:03:47,160 Speaker 1: view in place, and for corporations this is really critically important. 71 00:03:47,640 --> 00:03:50,520 Speaker 1: Make sure that you can see if something is happening 72 00:03:50,560 --> 00:03:53,680 Speaker 1: that is not right and take action on it. These 73 00:03:53,680 --> 00:03:56,040 Speaker 1: things need to be discussed at the board level by 74 00:03:56,160 --> 00:03:58,880 Speaker 1: c e O S, your incident response PM needs to 75 00:03:59,000 --> 00:04:02,360 Speaker 1: reach your ex ecutive management. They need to know because 76 00:04:02,440 --> 00:04:04,960 Speaker 1: there's a breach is going to have a material impact 77 00:04:05,000 --> 00:04:07,440 Speaker 1: on an organization at a point in time, and that 78 00:04:07,520 --> 00:04:11,480 Speaker 1: needs to be established. So what is the gap. Because 79 00:04:11,600 --> 00:04:16,880 Speaker 1: everybody's talking about cybersecurity and cyber risk. We've seen Target 80 00:04:16,920 --> 00:04:21,440 Speaker 1: get hacked, We've seen JP Morgan with hundreds of technology 81 00:04:21,480 --> 00:04:24,240 Speaker 1: and cyber risk experts in place, get hacked and they 82 00:04:24,240 --> 00:04:26,680 Speaker 1: didn't even know it for months. So what is it 83 00:04:26,760 --> 00:04:31,200 Speaker 1: that big sophistic big sophisticated companies and executives are missing 84 00:04:35,080 --> 00:04:37,880 Speaker 1: the idea that this is a risk. I think I 85 00:04:37,920 --> 00:04:39,919 Speaker 1: think it's starting to dawn on people. I mean, the 86 00:04:39,920 --> 00:04:42,840 Speaker 1: fact that you've invited me here today is I am 87 00:04:42,839 --> 00:04:45,920 Speaker 1: truly pleased about that. And the idea that cybersecurity is 88 00:04:45,960 --> 00:04:48,960 Speaker 1: being discussed in this kind of venue is really important. 89 00:04:49,480 --> 00:04:52,440 Speaker 1: And I think the idea that it can happen to 90 00:04:52,520 --> 00:04:56,240 Speaker 1: you is what's missing. Because everyone looks at this and say, well, yeah, 91 00:04:56,240 --> 00:04:58,479 Speaker 1: I'm sure somebody else is going to get hacked. I 92 00:04:58,480 --> 00:05:00,560 Speaker 1: mean the four people at home depot right after the 93 00:05:00,600 --> 00:05:03,560 Speaker 1: target thing. And and I'm not throwing rocks at anybody. 94 00:05:03,600 --> 00:05:07,440 Speaker 1: Everybody who is in this business is scrambling hard all 95 00:05:07,440 --> 00:05:10,400 Speaker 1: the time, and I know they were scrambling hard to 96 00:05:10,440 --> 00:05:13,880 Speaker 1: get done before they could get breached. And that's you know, 97 00:05:13,920 --> 00:05:17,279 Speaker 1: when you realize that it's in your sector, then your 98 00:05:17,440 --> 00:05:20,400 Speaker 1: eyes are opened wider. But I think the idea that 99 00:05:20,600 --> 00:05:23,599 Speaker 1: it could happen to you and not just you, um 100 00:05:23,640 --> 00:05:27,080 Speaker 1: your vendors, the people who you're working with, their externalities 101 00:05:27,120 --> 00:05:29,840 Speaker 1: to your organization. That also need to be considered in 102 00:05:29,920 --> 00:05:32,920 Speaker 1: this mix. Um, And if you're going to do like 103 00:05:32,960 --> 00:05:35,480 Speaker 1: a merger or something like that, what is the cybersecurity 104 00:05:35,520 --> 00:05:38,680 Speaker 1: posture of the organization that you're bringing in are you 105 00:05:39,080 --> 00:05:41,560 Speaker 1: are you walling them off? What happens if something happens 106 00:05:41,600 --> 00:05:43,760 Speaker 1: to their data while you're buying them and what's your 107 00:05:43,880 --> 00:05:47,359 Speaker 1: risk to those to that data and to the people 108 00:05:47,400 --> 00:05:50,560 Speaker 1: who own that data or who are um you know, 109 00:05:50,600 --> 00:05:52,320 Speaker 1: if you if it's a p I I question or 110 00:05:52,360 --> 00:05:56,400 Speaker 1: something like that, let's p I personally identifiable information thank you? 111 00:05:56,839 --> 00:05:59,760 Speaker 1: Um yeah, if it's information about human beings and that 112 00:05:59,800 --> 00:06:01,719 Speaker 1: gets lost while you're in the middle of a merger, 113 00:06:01,760 --> 00:06:03,520 Speaker 1: it's like you can't say, oh, that's not me, that 114 00:06:03,600 --> 00:06:06,440 Speaker 1: was the other guy. It's you, and making sure you know. 115 00:06:06,480 --> 00:06:09,200 Speaker 1: And if you put your data into a cloud or 116 00:06:09,240 --> 00:06:11,839 Speaker 1: someplace else, and I'm entirely in flavor in favor of 117 00:06:11,880 --> 00:06:15,560 Speaker 1: clouds and places that can really secure data properly, but 118 00:06:15,800 --> 00:06:18,280 Speaker 1: if you are putting your data there and you think, oh, 119 00:06:18,320 --> 00:06:21,200 Speaker 1: they're going to take responsibility for it, you can't transfer 120 00:06:21,320 --> 00:06:24,080 Speaker 1: that particular risk. You still have that risk. You are 121 00:06:24,160 --> 00:06:27,719 Speaker 1: still responsible for that data because you've trusted with that data. 122 00:06:28,640 --> 00:06:31,640 Speaker 1: Speak if you can, about what individuals can and cannot 123 00:06:31,800 --> 00:06:35,120 Speaker 1: do in order to hance their enhance their own security. 124 00:06:35,160 --> 00:06:37,880 Speaker 1: Given that so much information is now being put into 125 00:06:37,920 --> 00:06:44,799 Speaker 1: smartphones and so much commerce is being transacted online, so 126 00:06:44,880 --> 00:06:49,080 Speaker 1: an individual cyber footprint tends to be much larger than 127 00:06:49,120 --> 00:06:52,200 Speaker 1: I think they think it is. UM. I mean, you've 128 00:06:52,440 --> 00:06:54,600 Speaker 1: all heard about the Facebook pieces. You know, don't tell 129 00:06:54,600 --> 00:06:57,000 Speaker 1: people when you go on vacation or where you're going, 130 00:06:57,000 --> 00:06:59,279 Speaker 1: and things like that. That I think is, you know, 131 00:07:00,080 --> 00:07:04,640 Speaker 1: basic information. And I think the other things that people 132 00:07:04,720 --> 00:07:07,880 Speaker 1: need to start thinking about are when they're using their phone, 133 00:07:07,920 --> 00:07:10,720 Speaker 1: are they in a protected environment? And by protected, I 134 00:07:10,800 --> 00:07:13,840 Speaker 1: mean do you understand what the protections are? Do we 135 00:07:13,920 --> 00:07:16,920 Speaker 1: understand how that is being encrypted? So if you're on 136 00:07:16,960 --> 00:07:20,040 Speaker 1: a closed network, okay, if you own that closed network, although, 137 00:07:20,080 --> 00:07:23,280 Speaker 1: make sure okay, change your passwords on your routers. You 138 00:07:23,280 --> 00:07:25,239 Speaker 1: know you buy those things, you put them in your house. 139 00:07:25,480 --> 00:07:27,480 Speaker 1: Make sure that you have a password on there that's 140 00:07:27,520 --> 00:07:30,320 Speaker 1: not the one that came with the router. Everybody can 141 00:07:30,360 --> 00:07:33,040 Speaker 1: do that, UM, make sure that you have passwords on 142 00:07:33,120 --> 00:07:38,120 Speaker 1: your computers. And thank you very much, our heart chief 143 00:07:38,160 --> 00:07:42,360 Speaker 1: Information Security officer for the f B. I think we're 144 00:07:42,360 --> 00:07:45,160 Speaker 1: gonna keep going here with our let we are. Oh, 145 00:07:45,240 --> 00:07:47,120 Speaker 1: I beg your pardon. We're gonna have more time. Yes, 146 00:07:47,160 --> 00:07:51,040 Speaker 1: we haven't been haven't been breached. Gis a chance I'm 147 00:07:51,080 --> 00:07:53,960 Speaker 1: gonna ask you a question or lett about the crime 148 00:07:54,000 --> 00:07:56,800 Speaker 1: side of this. I think one reason people or companies 149 00:07:56,800 --> 00:07:59,520 Speaker 1: don't feel vulnerable as they think who would care? Right, 150 00:07:59,560 --> 00:07:59,960 Speaker 1: They're gonna