White Papers

2021 Civil Unrest Planning
White_Paper_-_2021_Civil_Unrest_Contingency_Planning_pdf
Other Transaction Authority
TCG_Other_Transaction_Authority_r010821_REVISED_pdf
Chertoff Group and Dragos MITRE ATT&CK Framework
Chertoff_Group_ATTCK_ICS_for_Industrial_Organizations__Oct_2020__pdf
COVID-19
COVID-19_Risk_Management_Service_Offerings
Space and Missile Defense Market Review 2019
Chertoff_Capital_Space_and_Missile_Defense_Market_Cover 4
A Secure and Resilient US Electric Grid
A_Secure_and_Resilient_US_Electric_Grid_cover-2
Chertoff Group and FDD After Action Report
Chertoff-FDD-CEEW-After-Action - new
Building a More Secure Connected Healthcare Environment
TCG_Abbott_Cover_521x656
Lawful Access to Data: The Us V. Microsoft Case
Lawful-Access-To-Data
Why Medical Device Manufacturers Must Lead on Cybersecurity in an Increasingly Connected Healthcare System
Why-Medical-Device-Manufacturers
SEC Cyber Guidance
TCG_SEC_REPORT_9_pdf__new 2
Chertoff Group Contributes to Coalfire FedRAMP Market Report
Securing Your Cloud Solutions by Coalfire
Michael Chertoff Authors "a Public Policy Perspective of the Dark Web"
A-Public-Policy-Perspective-of-the-Dark-Web
Strong Authentication in Cyberspace & Key Principles for Policymakers
Strong-Authentication-in-Cyberspace
Secure Biometric Authentication:
Secure-Biometric-Authentication
A Guide to Navigate the CFIUS Review: Process, Strategy and Communication Considerations
CFIUS-Review-new
Stopping the Insider Threat: The Importance of a Complete Identity and Access Management Strategy, Rooted in Governance
Stopping-The-Insider-Threat
Securing Identity Does Not Stop with Strong Authentication
Securing-Identity-Does Not-Stop-With-Strong-Authentication
The Ground Truth About Encryption and The Consequences of Extraordinary Access
The-Ground-Truth-About-Encryption
Law Enforcement Access to Evidence in the Cloud Era
Law-Enforcement-AccesstoEvidence
Addressing Dynamic Threats to the Electric Power Grid Through Resilience
Addressing-Dynamic Threats-to-the-Electric-Power-Grid
The Chertoff Group and Marsh & Mclennan Report: "a Cybersecurity Call to Action"
A-Cybersecurity-Call-to-Action
Taken from the Source: First-Hand Accoutns of Identity Governance
Taken-from-the-Source

Videos

Michael Chertoff's Comments on 9/11
WEBINAR: Deciphering Biden's Defense Budget
Webinar: Supply Chain Risk Management
MICHAEL CHERTOFF JOINS CNN'S JAKE TAPPER
Webinar: COVID-19: Managing Risk & Building Resilience During a Pandemic
Into the Looking Glass: What to Expect from the Coronavirus by Year End
Michael Chertoff on CNN Newsroom
Michael Chertoff on CNN
Michael Chertoff Atlantic Council Remarks
The Chertoff Group Presents: Contingency Planning for Conflict on the Korean Peninsula
The Ground Truth: Data Access & Encryption
The Ground Truth: Encryption Backstory
Spotlight Session: Perspectives on Borders, Walls, and Opportunities Commerce & Security
Call to Action
How Cryptocurrencies and Distributed Ledgers Will Transform the Digital Economy
Artificial Intelligence & Security
Fireside Chat: The Board’s Perspective on Cyber Security: Risk Management & Growth Strategy
Governance, Measurement, and Response
The Role of the Board Director in Cybersecurity
Spotlight Session
Cybersecurity in Transition
Closing Remarks from The Chertoff Group’s “Focusing on the Future” event
Improving Identity and Trust Online
Security in the Boardroom
A Fireside Chat with Michael Chertoff
Welcome to The Chertoff Group’s Security Series: “Focusing on The Future: Prioritizing Security..."
Transferring Cyber Risk
The Three T's of the Digital Economy: Technology, Threat and Trust
There and Back Again
A Look Behind the Scenes Working in Russia
Competing on Privacy in a Tower of Babel
Security in the Boardroom
Leaning Forward with Your Cyber Investments...Without Falling on Your Face
Identity as The Great Enabler
Keynote Discussion with General Michael Hayden
Examining Encryption – What Can We Agree to Do?
Security and Innovation in Today's Global Internet Economy
Security and Innovation: We Can Talk the Talk But Can We Walk the Walk?
After the OPM Breach: What's Needed Next
Enough with Getting Pwned Through Passwords: Time for Stronger Identity Solutions
Security and Technology Investments: Trends and Outlooks
Privacy, Security and the Greater Good - General Hayden
Diminishing the Cyber Threat: How State and Local Governments Can Get Ahead
The Chertoff Group Security Series
4 FORMER HOMELAND SECURITY SECRETARIES SPEAK OUT ON ELECTION SECURITY