Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  October 21, 2016 10:43pm-12:01am EDT

10:43 pm
report that they are involved. and then segue over to the new activities not only do we have the biometrics to ensure giving cards to the right people and not giving them to them twice to have visions going fiver six times. >> but the biometrics are really taking care of that. miso 15 or 20%. >> to eliminate duplication
10:44 pm
so this new technology has given us the ability of the misuse of resources. to better understand their needs. and the payment to madison or rent. it isn't a corruption issue but making sure we can fine-tune the programming and again and still allow you that they are the biometric.
10:45 pm
and where they are appropriate but corruption is a huge issue to watch for all the time but like to see that new technology and then we don't do that much with the host government. that would be in issue. >> i have the exact issue someone getting fivers six cards to safeguard. >> we have a government program and it is the small country but of that the 16 million and before that day were distributed and costing them $3.66 with the mastercard debit card with
10:46 pm
uh partnership and basically what that did for disbursement with $375 million also to be paid off of one card. and then i pay a dollar 60. but that isn't the problem. ended south africa again the with 850,000.
10:47 pm
and with of refugee program is a true example to make things work in two partnerships. >> moving back into jobs with the nexus of traditional assistance for new technologies. but. >> of little bit of of mixed question that innovative delivery technology they will be n the repertoire for ever and we continue to innovate but as we've moved to a more local and regional procurement system with
10:48 pm
those emergencies and not so much of the innovation but what delivers assistance to the syrian side of the border. the new technology is opening the world you could not imagine a few years ago. >> that would like to comment as they move to new technology there are times when it is more disruptive
10:49 pm
and then the small mom-and-pop shops there is no longer a need as the organization moves away. menu build the economy from scratch that mom-and-pop shop will start holding a larger variety of goods and more meaningful way. said there is a time and place to give people the opportunity for pdf for tomorrow. >> questions or comments from the audience? >> this is bank rate of appreciate you coming out
10:50 pm
for this assistance interesting conversation. [applause] [inaudible conversations]
10:51 pm
10:52 pm
>> good morning. i am the president of the intelligence national security alliance and we would get started. i think we have 30 or 40
10:53 pm
people working their way through security make a director of national intelligence is close c. wanted to make sure he is here by the target through the preliminary remarks to talk to us about what we came to care about. of the half of our coast executives i am pleased to welcome you to the congressional auditorium for proselytes to welcome any audience joining us virtually. we appreciate c-span and other media outlets airing what we think is a thought-provoking discussion on the landscape with the public and private sector can come together to protect the nation. to navigate a complex environment to disrupt a
10:54 pm
centralized terrorist threat. we are especially pleased to have the director of national intelligence jim clapper to deliver the opening keynote. we are saying nice things hear i hope they pass this on he has been here almost with five decades of service to our nation. i don't think many people fully appreciate all you have done and how precious your tie is and we're deeply touched by your generosity to discuss six reuter important and complex topic of gathering intelligence to protect our nation. you have been outstanding champion of information sharing from your tenure particularly with regard to protecting that homeland. we could not have a more credible speaker to help set
10:55 pm
the stage for today's discussion to touch upon those involving threats and importance of continuing to strengthen intelligence sharing and cooperation between federal agencies and their state local tribal and territorial pardners in the private sector operators of the critical infrastructure. thanks to director clapper been put forward to your remarks. the complex devolving threat to what only pretension from the next illustration by also the next congress. the committee chairman and his staff secure this wonderful venue. he cannot stay by want to express our appreciation for his leadership on home and security issues.
10:56 pm
also the former deputy assistant to the president for combating terrorism in the warehouse will follow after director clappers remarks also with domestic security of leaders later on. we're pleased to have you. and have you been doing this important discussion putting together a great lineup is a team effort of cannot say enough about our teammate. it is of pleasure to work with the team on the development of this event they have been colleagues and partners and i thank them for their dedication and professionalism as a non-profit public private organization up close partnership between the private sector and government can greatly
10:57 pm
enhance the national security of the private sector access innovation and expertise. we have not had the chance to collaborate previously but i speak for the chairman and all of us would i say every hope to work together in again in the future it is my pleasure to welcome to the podium former chief of staff general schwartz to introduce director clapper. [applause] >> i will make one modest correction it was the year force by the way. [laughter] thanks so much. good morning to all and
10:58 pm
thank you for attending today's program. also the homeland house committee and security and for hosting this event this morning. the ranking member for their significant hospitality. for those of you who may not know i am president of the nonpartisan group called executives for national security over four decades one of the premier conduit's that senior private sector and leaders can amend their experience and expertise in the challenges they face to the committee berger of the members as a trusted partner to work through the unique public-private interaction
10:59 pm
to some of the nation's most pressing national security challenges. we're honored to partner to convene such an esteemed lineup of law-enforcement homeland's security to discuss a tightly important subjects tradition security. today america is confronted with a complex environment a terrorist threat continues to revolve physical attacks to the communities. cybersecurity is increasingly important component of the nation's security. as being cyberadversaries to compromise our critical infrastructure to steal intellectual property and as
11:00 pm
we all know it has recently reported, cybervulnerability is in our election system is a security risk as well. confronted with these challenges our public and private sector of leaders must work together to continuously improve the ability to navigate this complex environment continuous improvement is a core best practice founded on the notion that improvement is not a fixed point in time there is no finish line rather improvement must be pursued as a continuous and sustained effort with a dynamic learning process that requires the of leadership and the threats to our nation will continue to see the measure of our
11:01 pm
success with the ability to continuously to get ahead of the threats. with the extension of our focus how private-sector contributes to the nation's security in 2007 in response to the demonstration they set out to examine those considerable resources of the private sector to be better integrated into disaster preparation to bill day more responsive public-private partnership the government can leverage to deliver goods and services affected in a quicker and more efficient manner. as a focus to the nation's ability in the face of an evolving terrorist threat.
11:02 pm
for business leaders were deeply affected by the horrific events of 9/11 and committed to doing their part to ensure the nation could defend against the ever-changing domestic terrorist threat. how to improve coordination and information sharing between the security agencies at all levels of government building upon those past efforts such an approach could be organized between public and private stakeholders from the federal level down to this day and of local communities. strong partnership to each information needs to reprove the ability of the
11:03 pm
stakeholders to coordinate activities to wrench her rapid local to directed responses to the perceived threats. just as they strive for continuous improvement, a today's event is not the finish line. it is a continuation of our efforts with the national conversation on these issues the further conversation it is my distinct pleasure to introduce our speaker today the director of national intelligence, james clapper. when given the opportunity to work with individuals who are committed to public service to embody what it means to be a public servant , director clapper endive back a few years. he is among the handful that represent the best tradition has to offer we should all
11:04 pm
feel fortunate that he chose to use his talents to protect and serve our nation throughout his illustrious career. minnesota never be a career of the amount of success he has achieved in over 50 years of experience in the intelligence community gives a viable expertise and insight as a director of national intelligence has led the community since 2010 as the principal intelligence adviser to the president since the unanimous confirmation by the senate providing incredible stability to the role of the of leadership of the intelligence community. the top intelligence officer we look forward to his assessment.
11:05 pm
so please welcome our honored guest gem clapper. [applause] >> >> thanks for a gracious and generous introduction. else feel i should quit while i am ahead. while i am mad it out like to recall knowledge your continued distinguish service then your illustrious career in the airforce as chief of staff and the current position to serve this nation and its citizens.
11:06 pm
over the past few years during my tenure we had a very public conversation about the work of the intelligence community and how we should conduct it and allot of what was lost in the public debate of how we conduct intelligence is why we didn't do with in the first place. why does any nation state conduct intelligence? i spend a little time but did indeed end at its most basic level to reduce the uncertainty for the decision makers. batiste reduce the amount of uncertainty the decision makers have.
11:07 pm
with the president in the oval office or a war fighter we can eliminate but we can provide insight and analysis per to make uncertainty manageable. so that our national security decision makers can make educated choices with an understanding of the risk involved. so the way we operate on a shared understanding combat is why after the official nominations may reach the presidential vice presidential candidates to reduce uncertainty for the next president.
11:08 pm
when he or she steps into the oval will have as good an understanding of our world as we can provide. blade people wake up and knowing who our next president will be. when i say we i mean the world. with my travels overseas this year i was taken aback by the intense interest of this campaign. people everywhere hang on every word and by the way to do more than just listen. two weeks ago dhl secretary of state johnson released a statement to say those were directed by the russian government released on sites like ricky leaks -- from
11:09 pm
those russian director efforts going after those political organizations on the political cycle we regard this >> >> >> but but to to know what
11:10 pm
know what is right is right. had had then close the work then close the work to which occur president to which occur president icahn said that is icahn said that is still still true true man knowing man knowing what is right what is right is is the task the task they they cannot make cannot make that decision that decision for for them and would them and would not not want want to to go when it comes go when it comes to national security to national security to be to be as objective as objective as we can as we can to to manage manage the risk the risk and decide and decide what is right what is right at at the end of the day the end of the day hominy deck hominy deck chairs chairs to set out to set out we will we will be be in the engine room in the engine room to
11:11 pm
to keep keep the the ship running ship running so i so i plan to plan to come in this morning come in this morning to to reminisce reminisce a little a little bit bit but but the theme shifted the theme shifted how to how to do things do things differently maybe differently maybe so so instead of telling instead of telling some of my some of my stories stories of talk of talk about about the intelligence the intelligence community community and how and how change happens change happens in this great in this great city city. washington washington is is an interesting an interesting place place these days these days enemies accumulate befriends enemies accumulate befriends coming go coming go. washington washington is is a place a place where where people people think think differently differently and we find and we find a hard a hard. ancient. ancient tribal wisdom tribal wisdom says says when when you you ride a ride a dead horse dead horse the the
11:12 pm
best strategy best strategy is to is to dismount. dismount. here here is in washington is in washington we we try try other strategies other strategies that our less that our less successful successful suggested by a suggested by a stronger weapon stronger weapon, a change riders, a change riders, , and this is and this is the the way we way we avoid avoid ridden the horse ridden the horse or or have a have a committee committee to study to study the course or the course or lower the lower the standards standards and more and more divorces can divorces can be included be included or or revive the dead revive the dead wars wars higher higher outside outside contractors contractors to to ride it ride it but several dead horses together but several dead horses together to increase speed to increase speed we will we will hope that one of hope that one of them sprang to them sprang to life life finding and training finding and training to to increase the increase the dead horse population dead horse population. productivity study productivity study to to see see if the if the other other riders within riders within cruise increase performance cruise increase performance he doesn't have to he doesn't have to be fed be fed less less costly costly lower overhead lower overhead so so contributes more contributes more to to the the mission mission them them the allied force them last the allied force them last my favorite my favorite
11:13 pm
we will we will promote promote the the dead horse to the dead horse to the supervisory supervisory position position. [laughter] [laughter] we appreciate we appreciate the outside perspective the outside perspective those those that that have the courage have the courage to to recognize recognize that the that the dead dead horse does horse does not not go anywhere. go anywhere. i i have have been using been using that that almost almost cheers cheers there is a there is a lot lot of of truth truth to it to it. it is it is also deceptive also deceptive because because a looks like a looks like we're doing we're doing nothing nothing and getting and getting nowhere nowhere when when really, really hot or making hot or making progress progress although although sometimes sometimes their multiple their multiple divorces divorces behind behind us. trying us. trying to look to look back back on on 52 years 52 years in this business in this business, , and to the day when i and to the day when i first guarded first guarded there wasn't there wasn't such such a a thing thing as the as the intelligence community. intelligence community. most people most people probably probably remember remember before before and 11 the intelligence community and 11 the
11:14 pm
intelligence community was was a phrase a phrase you you only only uttered tongue-in-cheek uttered tongue-in-cheek. june 2004. june 2004 the the 9/11 commission released the report 9/11 commission released the report on the on the terrorist attacks terrorist attacks. i i know most know most have have read read that commission that commission but it is but it is worth reading worth reading again again when you when you have have a chance a chance. and opens and opens with people going with people going to work to work and with and with a terrorist cell a terrorist cell getting getting on a on a plane in portland plane in portland maine maine and what and what happens happens the day the day and how and how we responded we responded and missed the opportunities and missed the opportunities to keep to keep them from them from happening. happening. commissioners graphically commissioners graphically described described the phrase the phrase this system was this system was blinking blinking red red. i will i will read read a passage a passage in think in think deals with deals with the the problem that we have problem that we have with intelligence with intelligence agencies agencies cooperative some of the time cooperative some of the time even even as what
11:15 pm
as what there was there was is not is not the same the same as joint action as joint action it defines the problem it defines the problem to to seek help seek help with it when with it when the the problem problem and the actions are and the actions are defined defined individuals from individuals from different different backgrounds backgrounds plan how to plan how to manage it manage it. of course, of course, integration integration which is which is then then my my mantra mantra for for the the passage years passage years is a is a prerequisite prerequisite to to reaching reaching the the 9/11 commission 9/11 commission jointly jointly. summer summer fall fall 2004 the 2004 the commission report commission report weighed heavily weighed heavily on on discussions of discussions of the the state of state of the the u.s. intelligence u.s. intelligence committee. committee. along with along with the fact the fact that a fall that a fall after baghdad after baghdad people people were asking were asking why we why we still still had of our weapons of mass had of our weapons of mass description description one negative one negative destruction destruction it
11:16 pm
it sorted sorted through through the statutory the statutory changes changes so so much, much
11:17 pm
11:18 pm
11:19 pm
>> >> dead how to keep it from happening again. of course, the patriotic men and women who of joined us since then it occurred to me we have piscine that are seven years old. there are people working for us today that don't have a memory of that day. that brings me to the topic of discussion here today the changes you may think about going forward with the domestic terrorism threat. if the taken altogether is a way of the threats that are out there to be in the
11:20 pm
cyberdomain criminals are thrown in together like north korea and iran. the russians and the chinese who are more sophisticated and can do real damage. and terrorist groups who experiment with hacking each of these have differing capabilities when they conduct operations and all of them operate on the same internet. sometimes this makes me long for the days when the world had to large mutual excuses communication networks one was dominated by united states and the other dominated by the soviet union.
11:21 pm
we could be reasonably sure if we were listening to someone on the soviet dominated network that person was probably not going to be a u.s. citizen. today that is not the case and makes our work exponentially harder and when it comes to groups like isis the problem is not the cyberhacking capability but how the internet enables them to recruit and inspire all over the world. we can monitor or infiltrate but it is very difficult to expunge the internet from the ideology and the toxic idea is preventing the spread of dangerous ideas is a consideration knowing what is going on to read the extremist propaganda that
11:22 pm
has the talent beyond that of the great intelligence analyst and when it comes to protecting the nation we also need to factor in and protecting civil liberties. to witness a lot of teeth gnashing when the fbi previously investigated the fbi director precisely describe the problem with his analogy that we are expected to just find a needle in the haystack but also guessing which pieces of k. have the needles as we monitor the americans that is not who we are but the domestic security in this realm is a difficult problem integration of our intelligence law-enforcement homeland's security
11:23 pm
community is critical to national security and that is a working in progress that we will continue to reprove long passed tonight in an assisted living. and to recognize we're doing hard work it does not necessarily show itself budding gradual problems. the relationships are grown the processes improve and one of the things we have done is an example is the domestic program which initially was run as a year-and-a-half pilot modeled after which my representative to coordinate
11:24 pm
intelligence in each country . this pilot had a positive impact securing state and local officials. we designated the executives in 12 locations around the united states they have made great improvements to integrate and coordinate the program is not perfect and is continuing to mature and shows every shift focus to domestic intelligence coordination with counterterrorism and this is something we will need to continue to get better at because terrorism problem will not go away as it continues to morph and transform every have to stay up with it to stay ahead of
11:25 pm
it. it has metastasized with all of the affiliate's they're driving the threats one trend is michael and predictable instability but two-thirds of the nation's around though progress some risk as they exited a characteristic of instability. we can predict which specific government is next that is something the whole world is dealing with right now. in the past six months i observed many nations are starting data growth curve over the past decade and a half and many of them are far behind.
11:26 pm
i see professionals get up every morning but there are limits to what we can do and bound by the realities of the resources that are allocated. some of the obvious solutions with get the political landscape that we were again and lived in a federal system of government to have a lot of autonomy a bewildering array of sensitivity is an across the nation more than 18,000 montforts men agencies that they operate in limited authorities within the domestic sphere. and we envision the national intelligence agencies operate inside the united
11:27 pm
states. and there is a footnote of history to serve up the balance the 9/11 commission recommended the leaders have statutory domestic authority the recommendation did not make its way. so for the dien night or the ic decree the intelligence structure organization to focus require new legislation and authorization specifically to sign that authority which by necessity comes menasha referendum of overwhelming public support. particularly over the last three years i have not seen a fan letter that says james clapper should be given more
11:28 pm
authority or capability to monitor what is happening inside the united states. is somebody did suggest that idol think it would support it. , have been in this business over half a century i have seen with it is like where intelligence agencies do have that component and it's not us. we're not iran are north korea. the greatest free nation on earth and the way to face extremist self radicalized individuals to lash out and do less harm to let our values and the principles that have maker nation great become prized. we get better by valuing our differences to respect what each is best that we will
11:29 pm
certainly help to do that i will leave you with one other thought of a dialogue of the upcoming presidential transition. in the election cycle that seems to get sportier every day. people are nervous about what will happen so those messages that i speak out about is that it thinks it will be okay. . .
11:30 pm
>> so thank you to all of you for being here thank you for your interest. i think i will stop talking at you and we will take our seats. thank you. [applause] >> ladies and gentlemen we have about ten minutes, maybe a little less be for the director needs to move on. so i think i will ask a question
11:31 pm
and then will be happy to take questions from the audience, one or two. sir, you mentioned your conviction that partnerships are the name of the game and it is one of those things that offers hope, if you will. clearly that is the case. i wonder if you might elaborate a little bit on how you see, how we might advance public and private partnerships in particular with regard to the intelligence mission been with regard, both in terms of tactics, techniques, procedures perhaps but more importantly to take advantage of the eyes and ears of of others. >> just speaking in the confines of the united states, i have seen just in my time a great improvement and certainly the
11:32 pm
relationship we have with homeland security and law-enforcement communities. as i have traveled around i have visited all of the domestic cities at least once and always engaged with the local officials, local police chiefs, i continue to be very impressed with the sophistication that is exhibited by particularly the police, very sophisticated approaches to analysis, very enlightened approach to the ct problem at the local level and i find that just about everyone i have encountered would fit right in with a meeting of the national intelligence board. they have imported many analytic
11:33 pm
tactics, techniques, procedures that we employ and the national community are being employed locally. there are many that we try to use, many which is this one to reach out to the private sector. that is a daunting task because of the private sector is a big as all outdoors. i mentioned the numerous police jurisdictions there are in this country. i think we have made headway in the flow of information, both in when i say integration by the way i think the conventional meaning is horizontally across the national components. >> integrating with the state, local, and tribal and private
11:34 pm
sector this is a work in progress, it is not as mature as foreign intelligence business which we have been asked a lot longer. i've seen huge improvements since 9/11. i have started as an nga director two days after 9/11 and have been in some capacity ever sense in 15 years and i have seen great improvement. not to say we we have achieved serve and iran are, apsley. this is a work in progress. we will continue to work it. seeing frank taylor in the audience from dhs, i just want to single frank out for the tremendous work that he has to and dhs and in fostering this relationship with the state, local, and tribal sector. what frank has done to rationalize and synthesize
11:35 pm
intelligence within dhs. building on the work, the legacy left by karen wagner, someone else in the audience today. so we are working at hard, it is not perfect, we will keep at it, frank and i will for our remaining 92 days, who is counting, and whoever succeeds us will continue to do the same. >> thank you. a question from the audience please. >> patrick tucker. you talked a bit in your discussion about the recent attribution of hiking attempts against u.s. political organization, and the press we get questions about how
11:36 pm
confident are people in the intelligence community that this is related to a state-sponsored actor. can you, without giving away important technics, procedures or other evidence, can you evidence, can you tell us a p2 a, ap two nine, what to you know about them. you have specific individuals without revealing the identities in mind, do you have specific buildings? how strong is your confidence that it is related to state activity and. >> that's a number of questions wrapped up into one server, so please over to. >> if you read the statement that we issued which is i think you would agree is unusual, we would not have made it unless we were very confident. i am not going to discuss the underlying evidentiary basis for it, but when we say we are confident, that speaks for itself. that is one of the reasons we waited for as long as we did to make a statement was to ensure
11:37 pm
that we had sufficient evidence, both forensic and otherwise to lead us to the conclusions we reached as articulated in the statement. i do do not think i will say anymore about it except the statement speaks for itself. it was mainly address to the american electorate, not to any foreign nation states. >> ladies and gentlemen, the director needs to move on. again, sir, thank, thank you so much for joining us this morning. and for this audience of practitioners, we like to acknowledge that jim clapper has been a practitioner for over 50 years for the united states of america, thank you. [applause]
11:38 pm
>> sunday night at 9:00 p.m. eastern on afterwards, to lisa talks about her life and experiences in the u.s. as an undocumented immigrant in her book, my underground american dream, my true story is an undocumented immigrant who became a wall street executive. >> she is interviewed by doris meissner, on the u.s. policy program senior fellow and director. >> is a little girl child, not having your parents with you and only seen them every few months, first of all you feel like they are bit of strangers to you because when i would see my parents they would come bearing lots of presents, when i came to visit them in the u.s. it was summer vacation, it was a very different experience than having parents who are with you every single day.
11:39 pm
>> afterwards, sunday night at 9:00 p.m. eastern on book tv. go to book tv.org booktv.org for the complete we can schedule. >> now, nsa director and u.s. cyber commander michael rogers on cyber security and the need to recruit, train, and retain highly skilled professionals. he spoke at the cyber maryland conference in both more. this is just over 45 minutes. >> good morning everyone. we will get started in just a minute so if we could have you find your seat. [inaudible] [inaudible] >> good morning. on behalf of cyber maryland
11:40 pm
advisory board i like to welcome you to the sixth annual cyber maryland summit. i am david, joining me is rick, where the cofounders, cultures of the cyber maryland advisory board. it is my great pleasure to welcome the attendees, speakers, exhibitors, and sponsors to this event. also our locals, state, and federal policy makers and other dignitaries in the audience. six years ago cyber maryland started as an idea that built in silicon valley to unify the cyber maryland ecosystem around a common theme. to be the epicenter of cyber security. six years later, looking around the room i would say that we have been successful. would you agree? [applause] >> the question we always ask is
11:41 pm
what is next, cyber maryland has become a model for other states and earlier today we made an announcement about a program called cyber usa. a community of communities and cyber states which will be led by the former under secretary of commerce, fill bond and the first dhs secretary, tom ridge, former governor of pennsylvania. >> we wanted to kick off at the session today as everyone knows that cyber security is the news space-age. what happened when the space race was going on, countries were trying to get to the moon. right now we have a situation where cyber security does not have a zip code, does not represent 2121 two. colorado, california, california, and so on so the first move was to numbering the states together in
11:42 pm
a collaborative effort was cyber usa. then we wanted to do one of the major parts of building this cyber ecosystem is building the next generation which we call the cyber generation. we thought it would be appropriate to have a student, and high school that is teaching introduce our keynote speaker. i've had the pleasure of introducing, rogers in varying different sessions and conferences, but what is unique about this is that a year year ago we stood on stage at this conference with rob joyce and kathy hudson and nsa launched a program called the nsa day of cyber. yesterday we reached 5 million students that signed up to start to explore their future. as our introduction to the keynote speaker happens, this got started because three years
11:43 pm
ago is teaching a high school at dunbar, class on technology and i asked a bunch of students what you want to be when you grow up in their answer was, doctor boyer, ray lewis. >> now we are hearing them as early as last month in arkansas, california, virginia, maryland, everywhere, is doctor lawyer, forensic analysts. doctor, lawyer, lawyer, forensic analysts. dr., lawyer, reverse engineer. i think the grassroots movement has created a movement that our neighboring states are now starting to work upon and collaborate upon so we can protect the nation and create the cyber generation. it is my pleasure now to introduce a teacher of a local high school, steve, and one of his students to come up and introduce emma rogers. steve, if you you can make your way to the stage i want to just
11:44 pm
make a comment about this teacher in general. this is the world's first cyber teacher who, at, at a high school level has now built a program in a high school where the most popular sport on campus cyber. over 1106 middle school, and high school students come after school from 3227 under their own accord to learn, compete, and he has now built this into the cyber high school in the model. so now high high schools around the country and around the world are modeling this on how do you give students who have the capability to really demonstrate cyber skills to be able to continue and grow this model across the country. it is my pleasure to introduce
11:45 pm
steve from loyola high school. [applause] >> good morning. my name is steve, i'm director of technology in maryland. thank you for for the opportunity to be here, the cyber maryland conferences near and dear to my heart. this really was the inspiration five years ago to start our program. it is nice to be in a room full of like-minded folks who have the same goal. that is educating the next cyber generation. over the past five years one of the goals and my goals to solve the talent pipeline problem from k-12 through higher ed and then through industry. we started as rick mentioned five years ago was six students. i thought, well that was a fun club for a year. and now we have 106, don't hang posters come i don't get on the morning announcement. it is been driven by student interest because students in the high school can do more.
11:46 pm
then what we may think this morning we're joined by several students, one in particular, here is junior -- andrew is in the second year with us. this past summer is a sophomore, think back to my summary and high school, i think i was still mowing grass in my summer. he did a internship at the health systems in chattanooga, tennessee where he was a member of the network security team. he brought that information back to layla and is no teaching to our students in grades eight through 12, he is a junior. he is already looking forward to continuing his education in college when he graduates in 2018. he is carrying a full load of ap courses, please worsen the rugby, and works in our science program because he wants to, not
11:47 pm
not because he has too. so motivation is key. with that, i am pleased to introduce you to andrew,. [applause] >> thank you. i would also like to thank you for inviting me to the cyber summit this morning. as a junior in high school, i completed an internship in chattanooga, tennessee and found great passion the field within two years. relates to everything we do every day and it excites me in the direction of which the field is headed. we are joined by a man whose whose position is the head of national security agency and central security service, to organizations that play a crucial role in today's world. more information about admiral rogers, can be found in the bio in your programs.
11:48 pm
as we are aware, cyber has become the next to me to defend and is the space race of my generation. with the growth of the field, unemployment is nonexistent. hundred admiral rogers, i'm proud to say that that essay has welcome our interns my age than ever before. we are faced with real-world, challenging issues and i am willing and eager to fulfill those needs of this country. by accepting interns from high school and college, i appreciate that admiral rogers have recognized in a brace that young adults can do more than expected. it is with great pleasure that i welcome admiral rogers to the stage. [applause] >> is that an oppressive young man, or what. >> imagine, thank you very much
11:49 pm
imagine if you were 16 or 17 years old and someone ask you to stand up in front of hundreds of people, cameras, introduce a man you never met and to do it in front of a lot of people. thank you very much i want to thank you all very much for taking time to support cyber maryland, i'm here because i'm part of the maryland cyber ecosystem both as commander of the cyber command and director of the national security agency. were proud to be part of this ecosystem. i'm here because i want to share a few thoughts and challenges on cyber security, also if there is a young man or woman in this audience who is interested in challenging work in the cyber field at nsa and cyber command we have great opportunities. i'm interested in getting every motivated and talented person to be apart and help build a future in defending structures, networks within the united states government and how we as nsa, part of a much bigger team
11:50 pm
can do our part to help defend our nation and help our friends and allies around the world. cyber is the ultimate team activity. in the 35 years i've been an officer in the united states navy have never been part of a mission before in which your success and the ability to generate operational outcomes is so dependent on a broad variety of partners. that is both challenging but it also represents opportunity. you see that in this audience today, among you are high school students, college students, the naval academy, people involved in academics, people involved in industry. people industry. people involved in the government at the state and federal and local level. it is our ability to harness all of these capabilities that these groups represent and into an integrated team that is working on some tough problems i think
11:51 pm
we all have to acknowledge that we are not where we want to be where it comes to cyber security. let's is reflected in the level of investment, as reflected in the increased level of activities that you read about in whatever your potential source of news is, whether print, online media, whatever, you cannot go literally hours without something popping about a major a major cyber challenge somewhere both here within the united states, but globally as well. this is not a phenomena that is restricted to a particular nation, particular area, or particular sector, or segment. there is literally activity of concern out there and every segment of our private sector, across the u.s. government, with our allies and friends around the world. i suspect that dynamic is not going to be changing in the immediate near term. collectively we need to step back and ask ourselves what we can do to work together to
11:52 pm
address the challenges associated with the cyber environment that we're dealing with today. that means information sharing is going to be critical. the government with legislation that has been passed in the last 18 months, we started initial framework with how are going to do that. in the federal government we've taken time to outline the roles of the different parts of the federal government and how we're going to provide support both coordinating internally within the government and perhaps more importantly, how are we going to apply that capability more broadly across our nation. as a part of that team on the first to acknowledge that one of our objectives has to be how can we help simplify to our private sector friends how you interact with us. we have to make it easier for you. we have to align the insights that we generate to generate value for you so what is the
11:53 pm
information you need, how do you need it, and what format, what truly is the value to you. you don't want us deciding that. we need to partner with you and understand what it is you feel that you need. at the same time, we are are out there competing for the same workforce. that challenge is not going away. if you look at the human capital piece of that challenge, i would argue that in some way that is the greatest challenge of all. that while the technology is incredibly important to our ability to meet the needs that are associated with the challenges of cyber and cyber security, perhaps the greatest challenge is not the technology but the human capital. how do you make user smarter? that they are making smart, intelligent, well-informed decisions, you can have the greatest defensive strategy in the world, but if your users are making choices that undermined that security, you have have
11:54 pm
made your job that much tougher. by the same token, you need need an incredibly motivated and focused workforce. you not only have to have a workforce in which segments of various specialized training, but as i said, we have to raise the knowledge level of every single individual within our structures. so the human dimension and the ability to generate trained men and women with the right kind of background insight is a challenge that as a nation we are only beginning to come to work with. i don't think any of us in this audience would tell us that i have all the people i meet meet with all the right skills in all the right background. we clearly are not where we need to be. that is one of the reasons why i like to do things like cyber maryland. an essay and cyber command we want to be part of the solution.
11:55 pm
you heard in the introduction some of the things were doing in terms of outreach to the private sector in terms of the academic world, with students, one of the things andrew mentioned was her internship program. we have come to the conclusions that one of the greatest returns of investment is getting young, motivated men and women familiar with us at nsa and cyber command earlier and earlier. we have an aggressive internship program at the high school, undergraduate, and the masters level for our organization. in fact i've been the director now at nsa for a little over two and a half years and i can remember the first week on the job. one of the things i like like to do is go down, walk around in a lunch in the cafeteria so i can talk to some of the workforce. the first week on the job i go downstairs for my office, go on the cafeteria and along the way stop and say hello to two young ladies. after lunch i go back to my
11:56 pm
office and i said to my team, i cannot believe how young we are hiring people. i just met two young ladies who i swear looks like there are 14 or 15 years old. i got, will sir they were probably interns. and i said we have interns, the thought to me, again just starting the job was that you mean we are giving security clearances to 15 and 16 -year-olds. i was the first to admit i was struck by while this is a different world and were going to have to do things differently than we have historically done. but i would tell you the internship program has among the highest returns of things we do. something over 65% of the people who in turn with us and up working with us. once they complete their education. that is a great place for us to be.
11:57 pm
you see that investment not just in us. many organizations are doing it. as a naval officer i highlight the work that were doing at the naval academy. we are making cyber courses mandatory for the entire brigade of the naval academy. we believe cyber is foundational for the future and everyone must have some baseline level of knowledge. we are past the time where it can be a don't need to worry about that, that's what my it guys do. as i said, given the challenges associated, that is not going to work. we have cyber major, we have broken the grounds or soon will come of this month we are breaking the ground on a new cyber center at the naval academy and we are now directly commissioning officers out of the naval academy within the cyber arena. something we had not done just until a couple of years ago. as a service we recognize that the world around us is changing and we realize we have to do things differently.
11:58 pm
you see that what the secretary is done in terms of our defense, innovation and experimentation. we acknowledge that as a department we have to go where the best technology and innovation resides in much of that is outside the government and outside the department of defense. we have to be willing to go to the outside world and say what can we learn from you, how can we partner, what kind of capabilities and insights you have that would generate value from us and help us in our mission to help defend the nation as well as defend her key friends and allies. another thing that i am telling the workforce is that because of the defensive side is a core aspect of our job we must constantly drive for success but at the same time we must acknowledge despite her best interest there will be times that we will fail. we must be prepared to deal with failure. when i first started my personal time and cyber i remember thinking to myself, the entire
11:59 pm
focus was to keep the opponent out of your network. that still remains the primary driver, after 15 years doing this in the department i've come to the conclusion that you must not only spend time focused on the but you must acknowledge that despite your best efforts you are likely to be penetrated. given that, that, what are you going to do. i will tell you as an individual who has had to deal with major penetration it is a very different thought process, different methodology and leadership style. what i'm dealing with problems in the investments were trying to make or stall as opposed our response. it is a great leadership challenge. it goes back to the human capital piece. as important as the technology is, don't ever forget about the importance of motivating men and women. without motivated men and women i don't care what your
12:00 am
technology is, how good your defensive team is or how great your network is, without motivated men and women, you don't have the edge you need. that is what gives you the difference. that's why i think so many of you being here today is very important to the future. we have to roller sleeves up as a nation, we have to realize this is not a short-term phenomenon. this is long-term, hard work, for all of us. we are going to step back and ask ourselves what we need to do to change the current dynamic. as i said earlier i don't think any of us would argue that we are where we want to be right now in terms of cyber security. with that, let's open it up for questions. >> good morning. my name is david and on the the host and producer of cyber wire podcast. we have questions that were sent in to the conference app through social

39 Views

info Stream Only

Uploaded by TV Archive on