No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • Artificial Intelligence (AI)
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Cyber Risk Mitigation, Courtesy the FBI

Early engagement with federal investigators creates strategic advantages that extend far beyond incident response

by Staff and Wire Reports
September 16, 2025
in Cybersecurity
fbi cyber security incident

Most companies treat FBI engagement like a root canal — something to endure only when absolutely necessary. That’s backward thinking, according to FBI Deputy Assistant Director Jason Cromartie, who argues that the time to build relationships with federal cyber investigators is decidedly not when your systems are on fire. Cromartie reveals how early cooperation transforms incident response from damage control to strategic intelligence gathering.

Maintaining open lines of communication with agencies like the FBI may not seem high on the agenda when companies are establishing or testing their cybersecurity practices. But given the load-bearing nature of private infrastructure, particularly in sectors like IT, establishing positive relationships with investigators long before a cyber breach occurs can pay dividends down the road, both for the company and the country, FBI Deputy Assistant Director Jason Cromartie told compliance professionals Sept. 15 at the SCCE’s 2025 compliance and ethics institute in Nashville, the organization’s 24th annual event.

“We recommend liaising and building networks with us ahead of an attack, so that the relationships exist before an attack occurs and we can get to things much faster,” Cromartie said, referring to the FBI’s 55 field offices. “In the crisis response world that I came from, we talk about the last time you want to exchange information and business cards is when the crisis is occurring.”

In 2024, the FBI’s Internet Crime Complaint Center (IC3) logged more than 260,000 complaints of cyber threats, with nearly 5,000 affecting organizations in critical infrastructure sectors, and total losses surpassed $16 billion. 

Cromartie emphasized early engagement with his agency, ideally before an incident occurs, but sought to dispel a potential reason for hesitation among some companies — the specter of triggering an SEC-mandated disclosure. He pointed to guidance from the SEC, which in 2023 finalized a rule requiring registrants to report within four calendar days a “material” cybersecurity incident, that consulting with law enforcement does not automatically trigger these obligations.

Indeed, not only does communicating with the FBI not necessarily start the clock on reporting to the SEC, but companies can put themselves on the good side of the commission and other enforcers, Cromartie said.

If victims request it, “the FBI can confirm victim cooperation with regulators and state attorneys general,” he said. “That cooperation can be deemed a mitigating factor when such entities consider enforcement action.”

Recent SEC cybersecurity enforcement cases demonstrate both the risks and potential benefits. In 2024 settlements involving SolarWinds-related breaches, companies faced penalties ranging from $990,000 to $4 million for misleading cyber disclosures, though the SEC explicitly reduced penalties after considering companies’ cooperation and remediation efforts.

Strategic FBI engagement

The FBI’s approach to cybersecurity emphasizes intelligence sharing that benefits entire industry sectors, creating what amounts to collective defense networks, Cromartie told the crowd during the event’s opening general session.

“When you share timely, relevant intelligence with us, we’re not only putting it into a database somewhere,” Cromartie explained. “We’re collecting it to build evidence, build intelligence, and we’re acting on that intelligence.” This intelligence gets used to identify attack patterns, track threat actors across industries and develop countermeasures that protect broader business ecosystems. Early reporters gain access to threat intelligence about emerging attack vectors before they impact competitors. 

“By reporting cyber attacks and intrusions to the FBI, we’re able to consolidate reports and identify other potential network attacks and identify other potential victims as well as identify other future adversaries,” he said.

For compliance teams, this reframes incident reporting from regulatory burden to strategic investment. Companies that cooperate early help build the intelligence foundation for FBI operations that can disrupt entire criminal networks, as demonstrated in recent takedowns of major ransomware groups.

drawing on map
Cybersecurity

Rather Than Rebellion, Treat Shadow IT As Your Tech Roadmap

by Apu Pavithran
August 5, 2025

Begin by understanding the what and why of shadow IT

Read moreDetails

To pay or not to pay

While acknowledging that “the FBI does not advocate paying ransom to adversaries,” Cromartie recognized the “tough business decisions” that require comprehensive risk assessment rather than absolute prohibitions.

The FBI’s opposition is clear: Ransom payments “do not guarantee that your information will be decrypted or deleted,” they “reward cyber actors and embolden them to conduct further activities” and they don’t “incapacitate the cyber actor from striking again in the future,” Cromartie said.

However, he outlined how the threat landscape complicates these decisions. 

“One trend in ransomware attacks is to exfiltrate or extract the data without encrypting the servers,” he explained, “focusing on demanding a ransom to prevent the selling or posting of the victim data.” This means “even with the efforts done to protect data, back it up and go through various safeguards to make sure that the data is still in place, they can still demand a ransom payment to prevent the data from being leaked or otherwise causing a company to suffer reputational damage.”

The tension grows when “criminals try to increase pressure with harassing phone calls and communications to employees, to executives or to other customers.” As Cromartie noted, “ransomware actors assume and likely count on [the knowledge] that if they can inflict more pain, people will pay more and pay more quickly.”

Those calculations appear sound: Ponemon Institute-Illumio research showed that 88% of surveyed companies experienced at least one ransomware attack in the past year, with just over half acquiescing to the ransom demand.

Infrastructure impact

Cromartie emphasized how cyber attacks ripple across interconnected infrastructure sectors. “Many of your industries are related,” he said, explaining how attacks on one sector inevitably affect others. “Healthcare, oil and gas, financial services, manufacturing, technology — all are important sectors that cyber adversaries want to target.”

This interconnectedness demands comprehensive vendor risk assessments. Rather than traditional due diligence focused on direct vendors, compliance teams should trace attack paths through vendor networks, third-party integrations and industry partnerships, he said.

Cromartie advocated for incident response that goes beyond generic planning. 

“Create an organizational incident response plan for continuity of operations,” he said. “Understanding and having your employees understand how to report incidents, and the plan should be ready and more importantly, perhaps practiced.”

The emphasis on practice addresses the reality that crisis decision-making differs from planning. “Compliance teams need processes they can execute quickly during a crisis while still keeping proper records for regulators.”

Actionable steps

Beyond strategic planning, Cromartie outlined specific steps compliance teams can implement now to strengthen their cyber risk posture:

  • Establish FBI field office contacts before an incident occurs. Contact your local FBI field office to identify the cyber supervisor and request information about programs like InfraGuard and the business alliance that facilitate ongoing public-private cooperation.
  • Build IC3 reporting into incident response protocols. Ensure your team knows to file complaints at ic3.gov immediately after discovering incidents, as rapid reporting can help the FBI’s asset recovery freeze stolen funds and provide decryption keys to victims.
  • Create communication templates that balance disclosure with security. Prepare template language for stakeholder communications that avoids revealing specific or technical information about planned response or cybersecurity systems while meeting transparency obligations.
  • Document materiality determination processes for audit trails. Establish written procedures for making materiality assessments without unreasonable delay that create defensible records for potential regulatory review.

Tags: Cyber RiskCybercrimeThird Party Risk Management
Previous Post

War & Peace: What You Need to Know About the Defense Production Act

Next Post

Common Threads: What Global Enforcers & Policy-Makers Are Saying About Compliance Programs

Staff and Wire Reports

Staff and Wire Reports

Related Posts

eyes watching in dark

When Online Threats Go Dark, Focus Shifts From Platform to Person

by Felix Cook
February 9, 2026

Organizations that treat threat assessment as ongoing operating rhythm — like financial risk or compliance — are best positioned to...

high rise building security

With Executives Becoming the Targets of Digital Anger, True Protection Begins Online, Long Before the Guards & Gates

by Felix Cook
February 3, 2026

Every conference RSVP, smart device and geotagged photo becomes a potential entry point for harassment, stalking or worse

news roundup green bars

Digital Asset CCOs Out-Earning Peers in Traditional Finance

by Staff and Wire Reports
January 30, 2026

Ransomware attacks hit record in 2025

NRF Litigation Trends 2026

2026 Annual Litigation Trends

by Corporate Compliance Insights
January 27, 2026

Corporate counsel perspectives on litigation risks Annual survey 2026 Annual Litigation Trends Survey What's in this survey report from Norton...

Next Post
woven threads

Common Threads: What Global Enforcers & Policy-Makers Are Saying About Compliance Programs

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2026 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • Artificial Intelligence (AI)
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2026 Corporate Compliance Insights