Blockchain & Cryptocurrency , Business Continuity Management / Disaster Recovery , Critical Infrastructure Security

Proof of Concept: Is the New Age of Cyber War Here?

Also: Cat-and-Mouse Game of Chasing Laundered Bitcoin
Clockwise, from top left: Anna Delaney, Tom Field, Ari Redbord and Grant Schneider

"Proof of Concept" is a new video series in which security leaders convene with ISMG editors to discuss and analyze topical cybersecurity and privacy issues.

See Also: Core Elements of Modern Workforce Identity Security

In the latest "Proof of Concept," Grant Schneider, senior director of cybersecurity services at the law firm Venable, and Ari Redbord, head of legal and government affairs at TRM Labs, join editors at Information Security Media Group to discuss trending cybersecurity issues.

Anna Delaney, director, productions; Tom Field, vice president, editorial; Grant Schneider, senior director of cybersecurity services, Venable; and Ari Redbord, head of legal and government affairs, TRM Labs - discuss:

Prior to joining TRM, Redbord was senior adviser to the deputy secretary and the undersecretary for terrorism and financial intelligence at the U.S. Department of the Treasury.

Prior to joining Venable, Schneider served as the U.S. deputy federal CISO and the U.S. federal CISO and as senior director for cybersecurity policy on the White House National Security Council. Before that, he served for seven years as chief information officer for the Defense Intelligence Agency.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.