• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechThe Mobile Executive

Inside the Republican National Convention’s Anti-Hacker Squad

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
July 21, 2016, 8:33 PM ET
Courtesy of ForeScout

Katherine Gronberg is stationed at the heart of the Republican National Convention’s cyber command in Cleveland, mere blocks away from the stage where Donald Trump will accept his party’s presidential nomination this week. She sits at a desk surrounded by gray cubicle walls, folding tables, television screens, and, of course, computers.

The temporary cybershop is a bit drab, admits Gronberg, vice president for government affairs at cybersecurity firm ForeScout. The mission, however, is anything but: protecting the computer networks that the convention’s staffers depend on to keep the show up and running.

“This is a very different environment than what we’re used to seeing,” Gronberg tells Coins2Day. “But there are a lot of similarities to the work we do for major companies and banks.”

Locking down such a large-scale, high-profile, albeit ephemeral event where thousands of attendees brings their own devices presents a unique set of challenges for her small team of half a dozen people, including some who work remotely. For one thing, the group doesn’t have to worry much about protecting sensitive data—intellectual property, customer information, medical records. Breach prevention is not the main aim; instead, the goal is to block disruptive attacks.

Get Data Sheet, Coins2Day’s technology newsletter.

ForeScout has two hardware appliances, a product called “CounterACT,” on site. The technology monitors devices connected to the convention’s network (which is different, by the way, from the public Wi-Fi accessible on the arena floor). The team’s job is to make sure that devices on the network are behaving properly; and that ones that aren’t can be tracked, quarantined, or booted from the network.

For more on network operations centers, watch:

There’s reason to be on high alert: Earlier this year factions of the shadowy, amorphous, and activist-driven hacking group Anonymous declared war on Trump, the Republican Party’s candidate. While Gronberg was limited in what she could say about the attacks her team has seen so far, she did tell Coins2Day that they have included phishing scams, denial of service strikes, device spoofing tricks (where one device, like a printer, mimics another computer in attempt to access higher value parts of a network), and botnet probes (involving armies of machines looking for vulnerabilities) originating from outside the country.

ForeScout is working closely with Dark Cubed, a cybersecurity startup whose software tracks and displays incoming threats. Other companies providing technical and security assistance to the convention include Cisco (CSCO), AT&T (T), and Microsoft (MSFT), Gronberg said.

Read more: “Inside AT&T’s Global Network Operations Center”

Max Everett, chief information security of the convention, has described the event thusly, according to Gronberg: If the 2012 convention was the iPhone convention, then this is the video-streaming convention. About two out of five devices on the network are non-traditional or within the “Internet of things” category, meaning printers, voice-over-IP telephones, video surveillance cameras, screen monitors, and other Internet-connected devices, according to ForeScout.

“There has been an explosion of devices, including TV screens, cameras, and even lights—these wouldn’t have been networked even four years ago,” Gronberg said. “You need a different kind of security approach.”

Gronberg’s team is gearing up for the big headliner night on Thursday featuring Trump. “We’re expecting more traffic,” she said, unfazed. “And we’ll be at the DNC [Democratic National Convention] next week.”

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.