Where Jeb Bush stands on cybersecurity

A look at what the Presidential candidates have to say about cybersecurity, starting with Jeb Bush.

After watching the recent televised Republican Presidential candidate debate, you may be wondering where the candidates stand on cybersecurity - which ties in to our nation's defense.

The topic of cybersecurity may be too technical and thus too risky for the candidates to speak out on TV, or the moderators don't want to devote time to it in place of what they consider to be more important issues.

To fill the void, we bring you a look at what the candidates are saying about cybersecurity.

We'll start with Jeb Bush, who's had a lot to say about it.

Here's some key excerpts from a blog post last week by Jeb on his "Jeb! 2016" website.

On the importance of cyber: "for all of the Internet’s transformational power, its future rests in part on one critical factor—cybersecurity."

Here's a hard knock on the current President, to be expected from a Republican contender: "Unfortunately, a series of high-profile cybersecurity failures and the Obama administration’s feeble response to the growing threat have demonstrated real vulnerabilities in government and private systems, eroding public confidence in both the government and even the Internet itself."

If Jeb doesn't win the Presidency, he can become an IT analyst.. all of the figures he quotes here are attributed to Symantec - the world's largest security software company: "Last year, 60% of all targeted attacks struck small and medium-sized organizations, which often have fewer resources to invest in cybersecurity.  In 2014, five out of every six large companies were targeted with spear-phishing attacks, a 40% increase over the previous year.  Attacks against small and medium-sized businesses increased 26% and 30%, respectively."

About the OPM fiasco and what he thinks should have been done: "The intrusion into the Office of Personnel Management (OPM)— the human resources department of the U.S. Government—illustrates the cultural failure of the Obama administration to take these threats seriously.  The OPM systems contain millions of personnel records—many of which included an intrusive and sensitive personnel questionnaire.  OPM officials knew this data was valuable, sensitive, and vulnerable, but failed to take basic steps to protect it."

Jeb on why Hillary Clinton can't be trusted on security: "It should not be too much to ask government officials to abide by the laws and rules in place to safeguard our national security.  Secretary Hillary Clinton’s growing email scandal highlights reckless behavior by officials entrusted with some of our nation’s most sensitive secrets."

Support for the FBI, but he offers no solutions to the severe cybersecurity labor shortage faced by federal agencies: "The Federal Bureau of Investigation also needs more resources to fight back against the onslaught of cybercrime."

[ ALSO ON CSO: 7 security and privacy concerns at the polls ]

Jeb advocates cybersecurity collaboration with U.S. nation partners globally...: "The need to protect sensitive systems from bad actors is a modern-day equivalent of securing the world’s oceans for freedom of navigation, and just as nations came together to protect the seas, they should do so to secure the Internet."

... and with the private sector: "The U.S. Government and businesses should work together as partners to improve cybersecurity in public and private sectors in a way that also respects citizens’ privacy."

Support for the tech industry... reading between the lines you might interpret his stance as supporting cybersecurity vendors in their efforts to build stronger encryption in to its products - without too much government restriction: "As part of this national effort to improve cybersecurity, the government must not be an obstacle to innovation in the tech industry. The government’s power to incentivize and empower must take precedence over its predilection to regulate and constrain. Because cyberthreats are always evolving, effective cybersecurity requires continuous innovation, which a flourishing tech industry provides."

Jeb says immigration can help spur new cyber startups, but he doesn't say how: "We need to transform immigration into an economically-driven system that retains and brings in highly skilled immigrants. Such a system would help create startups and increase innovation."

Next week: Carly Fiorina on cybersecurity.

(The author does not endorse any one candidate or political party in this article.)

Join the CSO newsletter!

Error: Please check your email address.

Tags cyber attackcyber security

More about BushCSOFBIFederal Bureau of InvestigationSymantec

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Steve Morgan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts