{"id":281,"date":"2024-09-18T06:00:00","date_gmt":"2024-09-18T06:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=281"},"modified":"2024-09-18T06:00:00","modified_gmt":"2024-09-18T06:00:00","slug":"cybersecurity-vet-madison-horn-makes-her-bid-for-us-congress","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=281","title":{"rendered":"Cybersecurity vet Madison Horn makes her bid for US Congress"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>It\u2019s safe to say that Madison Horn is the only candidate for US Congress in history who has ever injected Taylor Swift lyrics into a teleprompter during a pen test.<\/p>\n<p>A few years ago, while working in cybersecurity at a global consulting firm, Horn conducted that white-hat hacking demo to show her client, a media outlet, how vulnerable its systems are to much darker online exploits.<\/p>\n<p>\u201cIt was so important to understand how susceptible our media companies are to attacks in a different way, and what information could be broadcast to millions and millions of people in seconds,\u201d says Horn, now CEO of her own cybersecurity firm, RoseRock Advisory Group.<\/p>\n<p>After working in private sector cybersecurity for 13 years, Horn is running as a Democratic candidate in Oklahoma\u2019s fifth congressional district. She pledges to shine a brighter light on cyber issues if Oklahoma voters send her to Congress.<\/p>\n<p>That may be an uphill battle on Capitol Hill, where border security constantly overshadows cybersecurity \u2014 and Senate Majority Leader Chuck Schumer still roams the corridors using a flip phone.<\/p>\n<h2 class=\"wp-block-heading\">A path from cyber to politics<\/h2>\n<p>Horn, 34, is a seventh-generation Oklahoman and a citizen of the Cherokee tribal nation. She was born and raised in Stilwell, a tiny town with just 3,700 people and a 47% unemployment rate. It\u2019s part of Adair County, where 55% of households have no broadband access, 44% are Native American, and 20% live below the poverty line.<\/p>\n<p>Horn says that growing up in the heart of America\u2019s economic, social, and digital divide provided the inspiration for her run for political office.<\/p>\n<p>\u201cI grew up as a farm kid. I didn\u2019t have any type of true exposure to technology. But I did have exposure to what it means to struggle,\u201d she says. \u201cI\u2019m fighting to ensure we close that technological divide and truly understand the social impacts of it, like healthcare outcomes. It sounds like a cheesy platitude, but there\u2019s been a real decay in our rural communities and no one really gives a damn about them.\u201d<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\"> srcset=&#8221;https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?quality=50&amp;strip=all 2352w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=300%2C189&amp;quality=50&amp;strip=all 300w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=768%2C484&amp;quality=50&amp;strip=all 768w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=1024%2C645&amp;quality=50&amp;strip=all 1024w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=1536%2C968&amp;quality=50&amp;strip=all 1536w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=2048%2C1290&amp;quality=50&amp;strip=all 2048w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=1106%2C697&amp;quality=50&amp;strip=all 1106w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=267%2C168&amp;quality=50&amp;strip=all 267w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=133%2C84&amp;quality=50&amp;strip=all 133w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=762%2C480&amp;quality=50&amp;strip=all 762w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=571%2C360&amp;quality=50&amp;strip=all 571w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2024\/09\/Madison_Horn_Cyber_Presentation_1-scaled-1.jpeg?resize=397%2C250&amp;quality=50&amp;strip=all 397w&#8221; width=&#8221;1024&#8243; height=&#8221;645&#8243; sizes=&#8221;(max-width: 1024px) 100vw, 1024px&#8221;&gt;\n<p><em>Former CISO and US Congressional candidate Madison Horn gives a cybersecurity presentation to members of the US military<\/em><\/p>\n<p class=\"imageCredit\">Madison Horn For Congress<\/p>\n<\/div>\n<p>Horn left Stilwell and worked various jobs (office admin, tutoring, waitressing) until a chance meeting with some cybersecurity pros resulted in an entry-level job offer at their company. She worked her way up the ladder to cyber roles at Accenture and PwC.<\/p>\n<p>In 2022, she left her job as global cybersecurity portfolio lead at Siemens Energy to launch her first run for office, an unsuccessful campaign for the US Senate. She started her firm RoseRock thereafter, and currently sits on the advisory committee of the US Global Leadership Coalition, a non-profit focused on national security, foreign policy, and critical infrastructure.<\/p>\n<p>In her current political campaign, she views the cybersecurity of critical infrastructure \u2014 for oil, gas, electric, and nuclear power \u2014 as a cornerstone of national security. She had an epiphany about it early in her cyber career, while visiting a nuclear power facility to conduct a threat assessment.<\/p>\n<p>\u201cWhen you get close to one of those [nuclear] stacks, it\u2019s a very unnatural and humbling feeling. The ground is literally vibrating from the amount of electricity that\u2019s coming through. And you have the realization of what you\u2019re protecting, to ensure that no one can jeopardize a set of systems that could wipe away that entire state and have widespread impact around the way that we harness nuclear energy,\u201d she says.<\/p>\n<h2 class=\"wp-block-heading\">Cybersecurity policy priorities<\/h2>\n<p>If elected, Horn says she will push for more funding to modernize America\u2019s critical infrastructure grid, boosting its resilience to cyber threats. She\u2019s also in favor of creating rules of engagement for international cyber warfare, saying, \u201cThere\u2019s no real language that actually dictates the articles of war in cyberspace, and that\u2019s dangerous.\u201d Horn says multinational cyber defense treaties should be developed akin to <a href=\"https:\/\/www.nato.int\/cps\/en\/natohq\/topics_110496.htm#:~:text=Article%205%20provides%20that%20if,to%20assist%20the%20Ally%20attacked.\">NATO\u2019s Article 5<\/a>, \u201cso there are agreements of what can happen if someone attacks the US\u201d in the cyberspace realm.<\/p>\n<p>Domestically, Horn would like current federal cybersecurity regulations for <a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\">CISA\u2019s 16 categories of critical infrastructure<\/a> to be tailored to each sector. \u201cIt needs to be industry-specific because the same regulation isn\u2019t going to match water infrastructure facilities, or satellites in space, or telecoms,\u201d she says.<\/p>\n<p>In a campaign news release, Horn has urged the US to \u201cdevelop strategies for dealing with emerging technologies like AI and quantum computing at a national level.\u201d In an interview with CSO Online, she didn\u2019t elaborate on specific policy plans but said \u201cwhoever harnesses the power of AI first is going to dictate the global economy\u201d as the next global superpower. She believes the weaponization of AI for disinformation campaigns is a cyber threat to US elections, including the one she\u2019s running in.<\/p>\n<p>\u201cRussia, Iran, and China want to create a discourse of distrust within American institutions. They\u2019re pushing out narratives to create fractures so that Americans don\u2019t go out and vote,\u201d says Horn.<\/p>\n<p>A day after her interview with CSO, the US Department of Justice (DOJ) <a href=\"https:\/\/www.justice.gov\/opa\/pr\/two-rt-employees-indicted-covertly-funding-and-directing-us-company-published-thousands\">indicted<\/a> two Russians, alleging they paid a Tennessee firm $10 million to post anti-US propaganda videos online. According to DOJ officials, the 2,000 videos have racked up more than 16 million views on social media since November 2023.<\/p>\n<h2 class=\"wp-block-heading\">Cybersecurity remains an abstract concept on Capitol Hill<\/h2>\n<p>Even if Horn gets elected, her quest to make cybersecurity a higher legislative priority could prove tough to fulfill. One stumbling block is Washington\u2019s focus on border security over cybersecurity. While border security came up 20 times during the 90-minute Trump\/Harris presidential debate (an average of once every 4.5 minutes), cybersecurity elicited zero mentions from either candidate.<\/p>\n<p>\u201cDo we have immigration problems? Yes,\u201d Horn acknowledges. \u201cWhether that be fentanyl [trafficking] or the potential threat of terrorist groups or bad actors coming across the southern border, those are threats that people see in their communities. But when we talk about cybersecurity, it\u2019s still a little bit abstract, to be honest.\u201d<\/p>\n<p>Another challenge is the notorious dearth of tech knowledge on the Hill. Besides Schumer\u2019s undying devotion to flip phones, there was also Mark Zuckerberg\u2019s memorable appearance at a 2018 Senate hearing. High-ranking members of Congress asked the Meta CEO some truly <a href=\"https:\/\/www.vox.com\/policy-and-politics\/2018\/4\/10\/17222062\/mark-zuckerberg-testimony-graham-facebook-regulations\">bizarre questions<\/a>, suggesting they had no basic understanding of how social media or smartphones work.<\/p>\n<p>\u201cHaving someone in Congress with a background in [cyber], with hands-on experience, could lead to more informed decision-making. They can advocate for stronger cybersecurity laws\u2019 they can work on better funding for cybersecurity defense initiatives,\u201d says Dennis Dayman, CISO of Code42, a division of Mimecast. Dayman, who\u2019s also chair of the policy subcommittee at the Department of Homeland Security, has known Horn through cyber industry circles for a couple of years.<\/p>\n<p>Horn\u2019s Republican opponent, incumbent congresswoman Stephanie Bice, worked in finance, marketing, and business strategy at her family\u2019s technology company for eight years. Bice also had an executive role at a digital marketing agency and currently serves on the House Committee on Science, Space, and Technology.<\/p>\n<h2 class=\"wp-block-heading\">Aiming to be a \u2018powerful\u2019 role model for diversity<\/h2>\n<p>In the heart of Horn\u2019s electoral district, Mitzi Westerman runs a tech consulting firm in Oklahoma City. During Horn\u2019s 2022 senate run, they met briefly to talk about women in politics and <a href=\"https:\/\/www.csoonline.com\/article\/3499360\/women-in-cyber-day-finds-those-it-celebrates-leaving-in-droves.html\">cybersecurity<\/a> over lunch. Westerman says Horn, if elected, could be a powerful role model for diversity within both politics and tech.<\/p>\n<p>\u201cI couldn\u2019t be more excited about the possibility of someone with Madison\u2019s background, skill set, experience, and perspective being in the United States Congress. We\u2019re definitely underrepresented as women, in technology and in the leadership of our country at this moment. So I think it\u2019s hugely impactful,\u201d says Westerman, president and owner of mGroup IT and Telecommunications.<\/p>\n<p>Horn is definitely a statistical rarity in cybersecurity. In the US, just <a href=\"https:\/\/www.asisonline.org\/security-management-magazine\/latest-news\/today-in-security\/2024\/april\/The-Number-of-Women-in-Cyber\/#:~:text=%E2%80%9CISC2%20has%20estimated%20that%20the,used%20to%20create%20Thursday's%20report.\">20 to 25% of the cyber workforce <\/a>is female; only <a href=\"https:\/\/www.aspeninstitute.org\/wp-content\/uploads\/2021\/09\/Diversity-Equity-and-Inclusion-in-Cybersecurity_9.921.pdf\">1% <\/a>is Native American. As a Democrat running in Oklahoma, Horn is also a political underdog. Adair County is a deep red stronghold, voting Republican in every presidential election since 2000.<\/p>\n<p>Still, Horn managed to garner one-third of all votes in her failed 2022 senate bid, the best showing by a Democrat in an Oklahoma senate race since 2004. After making it all the way from her family farm in Stilwell to the cybersecurity boardroom, she\u2019ll try once again to make it to Congress in November.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>It\u2019s safe to say that Madison Horn is the only candidate for US Congress in history who has ever injected Taylor Swift lyrics into a teleprompter during a pen test. A few years ago, while working in cybersecurity at a global consulting firm, Horn conducted that white-hat hacking demo to show her client, a media [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":282,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/281"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=281"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/281\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/282"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}